| 0 |
| url |
VCID-15ny-qqbj-qyfk |
| vulnerability_id |
VCID-15ny-qqbj-qyfk |
| summary |
ImageMagick has infinite loop when writing IPTCTEXT leads to denial of service via crafted profile
A crafted profile contain invalid IPTC data may cause an infinite loop when writing it with `IPTCTEXT`. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-26066 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04844 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0483 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04791 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04757 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04617 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04608 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04641 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04658 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04675 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0468 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04669 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04635 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04623 |
| published_at |
2026-04-04T12:55:00Z |
|
| 13 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04599 |
| published_at |
2026-04-02T12:55:00Z |
|
| 14 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05247 |
| published_at |
2026-05-14T12:55:00Z |
|
| 15 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05144 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05193 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05239 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05245 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05244 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-26066 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-26066, GHSA-v994-63cg-9wj3
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-15ny-qqbj-qyfk |
|
| 1 |
| url |
VCID-1cpn-zvem-v7gt |
| vulnerability_id |
VCID-1cpn-zvem-v7gt |
| summary |
ImageMagick has uninitialized pointer dereference in JBIG decoder
An uninitialized pointer dereference vulnerability exists in the JBIG decoder due to a missing check. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-28691 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17474 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17414 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17322 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17542 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17495 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18833 |
| published_at |
2026-05-14T12:55:00Z |
|
| 6 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18877 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.1883 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18843 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18858 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18746 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18725 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18682 |
| published_at |
2026-04-29T12:55:00Z |
|
| 13 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18556 |
| published_at |
2026-05-05T12:55:00Z |
|
| 14 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.1864 |
| published_at |
2026-05-07T12:55:00Z |
|
| 15 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18741 |
| published_at |
2026-05-09T12:55:00Z |
|
| 16 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18704 |
| published_at |
2026-05-11T12:55:00Z |
|
| 17 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18735 |
| published_at |
2026-05-12T12:55:00Z |
|
| 18 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18975 |
| published_at |
2026-04-11T12:55:00Z |
|
| 19 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18928 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-28691 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-28691, GHSA-wj8w-pjxf-9g4f
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1cpn-zvem-v7gt |
|
| 2 |
| url |
VCID-29r3-kvf4-n3hc |
| vulnerability_id |
VCID-29r3-kvf4-n3hc |
| summary |
ImageMagick: Heap Buffer Over-read in WaveletDenoise when processing small images
A heap buffer over-read vulnerability occurs when processing an image with small dimension using the `-wavelet-denoise` operator.
```
==3693336==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x511000001280 at pc 0x5602c8b0cc75 bp 0x7ffcb105d510 sp 0x7ffcb105d500
READ of size 4 at 0x511000001280 thread T0
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-27798 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0274 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02818 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02717 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02704 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02694 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02713 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02763 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02743 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02733 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02854 |
| published_at |
2026-04-29T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02796 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02808 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04087 |
| published_at |
2026-05-12T12:55:00Z |
|
| 13 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04079 |
| published_at |
2026-05-11T12:55:00Z |
|
| 14 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04074 |
| published_at |
2026-05-09T12:55:00Z |
|
| 15 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04041 |
| published_at |
2026-05-07T12:55:00Z |
|
| 16 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04027 |
| published_at |
2026-05-05T12:55:00Z |
|
| 17 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04119 |
| published_at |
2026-05-14T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-27798 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-27798, GHSA-qpgx-jfcq-r59f
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-29r3-kvf4-n3hc |
|
| 3 |
| url |
VCID-2gw3-qfan-jygd |
| vulnerability_id |
VCID-2gw3-qfan-jygd |
| summary |
ImageMagick's failure to limit the depth of SVG file reads caused a DoS attack
Using Magick to read a malicious SVG file resulted in a DoS attack. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-68618 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.2751 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27584 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27692 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.2775 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27794 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27816 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27809 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27868 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.2791 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27908 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27966 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27867 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.28008 |
| published_at |
2026-04-04T12:55:00Z |
|
| 13 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.278 |
| published_at |
2026-04-07T12:55:00Z |
|
| 14 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32047 |
| published_at |
2026-05-14T12:55:00Z |
|
| 15 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.31977 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32042 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32052 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.31956 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.31979 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-68618 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.1 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-15ny-qqbj-qyfk |
|
| 1 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 2 |
| vulnerability |
VCID-29r3-kvf4-n3hc |
|
| 3 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 4 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 5 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 6 |
| vulnerability |
VCID-569d-6nue-5kbq |
|
| 7 |
| vulnerability |
VCID-5uyd-bv33-h7g1 |
|
| 8 |
| vulnerability |
VCID-5xqd-gf3b-4ygw |
|
| 9 |
| vulnerability |
VCID-5zkt-kcgx-a3e2 |
|
| 10 |
| vulnerability |
VCID-62ar-kwbq-nyh3 |
|
| 11 |
| vulnerability |
VCID-69f6-ceje-hyah |
|
| 12 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 13 |
| vulnerability |
VCID-6meg-yjby-a7gj |
|
| 14 |
| vulnerability |
VCID-6rma-wjdv-uqe9 |
|
| 15 |
| vulnerability |
VCID-6ztv-auh8-27gx |
|
| 16 |
| vulnerability |
VCID-acsa-1uwk-fqee |
|
| 17 |
| vulnerability |
VCID-anyp-2jr7-73a1 |
|
| 18 |
| vulnerability |
VCID-b5pd-kk97-gban |
|
| 19 |
| vulnerability |
VCID-bd1g-sfsp-37h7 |
|
| 20 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 21 |
| vulnerability |
VCID-cbqr-aybx-d3e6 |
|
| 22 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 23 |
| vulnerability |
VCID-d8yf-8rff-3yhf |
|
| 24 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 25 |
| vulnerability |
VCID-dtza-65ku-aber |
|
| 26 |
| vulnerability |
VCID-emmr-15qp-vfah |
|
| 27 |
| vulnerability |
VCID-f1zu-xb4j-8qhp |
|
| 28 |
| vulnerability |
VCID-fnck-7mvx-hqc9 |
|
| 29 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 30 |
| vulnerability |
VCID-gdg8-aejn-83c4 |
|
| 31 |
| vulnerability |
VCID-h221-qd8d-tqa5 |
|
| 32 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 33 |
| vulnerability |
VCID-jcjk-s89c-mbbm |
|
| 34 |
| vulnerability |
VCID-jvq6-xjbu-fkb9 |
|
| 35 |
| vulnerability |
VCID-kdw5-8y5z-zya5 |
|
| 36 |
| vulnerability |
VCID-kefv-kpkk-wudf |
|
| 37 |
| vulnerability |
VCID-mntx-6yku-3qcx |
|
| 38 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 39 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 40 |
| vulnerability |
VCID-p5aw-n691-nkff |
|
| 41 |
| vulnerability |
VCID-pcme-bwan-3bcf |
|
| 42 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 43 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 44 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 45 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 46 |
| vulnerability |
VCID-ruf5-255v-sfdb |
|
| 47 |
| vulnerability |
VCID-sd54-b8z1-2fg7 |
|
| 48 |
| vulnerability |
VCID-sd7w-6qv5-73ge |
|
| 49 |
| vulnerability |
VCID-sdc2-fcap-abaz |
|
| 50 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 51 |
| vulnerability |
VCID-tv15-dcnu-pbbn |
|
| 52 |
| vulnerability |
VCID-utfe-h3b7-jqcj |
|
| 53 |
| vulnerability |
VCID-uvpj-a8v5-ebgz |
|
| 54 |
| vulnerability |
VCID-vaks-d4k5-zue7 |
|
| 55 |
| vulnerability |
VCID-vpdn-g1k9-1kdn |
|
| 56 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 57 |
| vulnerability |
VCID-x44m-x33k-hydn |
|
| 58 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 59 |
| vulnerability |
VCID-xbsu-ac6g-53fn |
|
| 60 |
| vulnerability |
VCID-y4hn-6bv6-jugw |
|
| 61 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 62 |
| vulnerability |
VCID-yx7r-r7ez-7uhp |
|
| 63 |
| vulnerability |
VCID-z9t9-bxf9-hkfk |
|
| 64 |
| vulnerability |
VCID-zab9-9tqj-hbhg |
|
| 65 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 66 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
| 67 |
| vulnerability |
VCID-zx14-t8et-ufcq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.1 |
|
|
| aliases |
CVE-2025-68618, GHSA-p27m-hp98-6637
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2gw3-qfan-jygd |
|
| 4 |
| url |
VCID-2zje-ag2v-7kac |
| vulnerability_id |
VCID-2zje-ag2v-7kac |
| summary |
ImageMagick has heap buffer overflow in WriteXWDImage due to CARD32 arithmetic overflow in bytes_per_line calculation
A 32-bit unsigned integer overflow in the XWD (X Windows) encoder can cause an undersized heap buffer allocation. When writing a extremely large image an out of bounds heap write can occur.
```
=================================================================
==741961==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x5020000083dc at pc 0x56553b4c4245 bp 0x7ffd9d20fef0 sp 0x7ffd9d20fee0
WRITE of size 1 at 0x5020000083dc thread T0
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-30937 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02792 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02773 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0277 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02764 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02749 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04096 |
| published_at |
2026-05-14T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03864 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03984 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03996 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04002 |
| published_at |
2026-04-26T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04047 |
| published_at |
2026-04-29T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04004 |
| published_at |
2026-05-05T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04019 |
| published_at |
2026-05-07T12:55:00Z |
|
| 13 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04052 |
| published_at |
2026-05-09T12:55:00Z |
|
| 14 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04057 |
| published_at |
2026-05-11T12:55:00Z |
|
| 15 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04064 |
| published_at |
2026-05-12T12:55:00Z |
|
| 16 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03919 |
| published_at |
2026-04-11T12:55:00Z |
|
| 17 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03902 |
| published_at |
2026-04-12T12:55:00Z |
|
| 18 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03875 |
| published_at |
2026-04-13T12:55:00Z |
|
| 19 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03854 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-30937 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-30937, GHSA-qpg4-j99f-8xcg
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2zje-ag2v-7kac |
|
| 5 |
|
| 6 |
| url |
VCID-54da-fzyt-4ud2 |
| vulnerability_id |
VCID-54da-fzyt-4ud2 |
| summary |
ImageMagick has stack write buffer overflow in MNG encoder
A stack buffer overflow vulnerability exists in the MNG encoder. There is a bounds checks missing that could corrupting the stack with attacker-controlled data.
```
==2265506==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffec4971310 at pc 0x55e671b8a072 bp 0x7ffec4970f70 sp 0x7ffec4970f68
WRITE of size 1 at 0x7ffec4971310 thread T0
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-28690 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02346 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02324 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02321 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02326 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02316 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03055 |
| published_at |
2026-05-14T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02832 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02817 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02826 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02943 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02937 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02924 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-29T12:55:00Z |
|
| 13 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02949 |
| published_at |
2026-05-05T12:55:00Z |
|
| 14 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02969 |
| published_at |
2026-05-07T12:55:00Z |
|
| 15 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03006 |
| published_at |
2026-05-09T12:55:00Z |
|
| 16 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03015 |
| published_at |
2026-05-11T12:55:00Z |
|
| 17 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03022 |
| published_at |
2026-05-12T12:55:00Z |
|
| 18 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02856 |
| published_at |
2026-04-11T12:55:00Z |
|
| 19 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02837 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-28690 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-28690, GHSA-7h7q-j33q-hvpf
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-54da-fzyt-4ud2 |
|
| 7 |
| url |
VCID-569d-6nue-5kbq |
| vulnerability_id |
VCID-569d-6nue-5kbq |
| summary |
ImageMagick releases an invalid pointer in BilateralBlur when memory allocation fails
The BilateralBlurImage method will allocate a set of double buffers inside AcquireBilateralTLS. But the last element in the set is not properly initialized. This will result in a release of an invalid pointer inside DestroyBilateralTLS when the memory allocation fails. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-22770 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20739 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20883 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20898 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20855 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20803 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20793 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20785 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.2077 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20651 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20647 |
| published_at |
2026-04-26T12:55:00Z |
|
| 10 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20613 |
| published_at |
2026-04-29T12:55:00Z |
|
| 11 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20506 |
| published_at |
2026-05-05T12:55:00Z |
|
| 12 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20578 |
| published_at |
2026-05-07T12:55:00Z |
|
| 13 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20665 |
| published_at |
2026-05-09T12:55:00Z |
|
| 14 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20639 |
| published_at |
2026-05-11T12:55:00Z |
|
| 15 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20655 |
| published_at |
2026-05-12T12:55:00Z |
|
| 16 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.2097 |
| published_at |
2026-04-02T12:55:00Z |
|
| 17 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.21028 |
| published_at |
2026-04-04T12:55:00Z |
|
| 18 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20743 |
| published_at |
2026-04-07T12:55:00Z |
|
| 19 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20822 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-22770 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.2 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-15ny-qqbj-qyfk |
|
| 1 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 2 |
| vulnerability |
VCID-29r3-kvf4-n3hc |
|
| 3 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 4 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 5 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 6 |
| vulnerability |
VCID-5uyd-bv33-h7g1 |
|
| 7 |
| vulnerability |
VCID-5xqd-gf3b-4ygw |
|
| 8 |
| vulnerability |
VCID-5zkt-kcgx-a3e2 |
|
| 9 |
| vulnerability |
VCID-62ar-kwbq-nyh3 |
|
| 10 |
| vulnerability |
VCID-69f6-ceje-hyah |
|
| 11 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 12 |
| vulnerability |
VCID-6rma-wjdv-uqe9 |
|
| 13 |
| vulnerability |
VCID-6ztv-auh8-27gx |
|
| 14 |
| vulnerability |
VCID-acsa-1uwk-fqee |
|
| 15 |
| vulnerability |
VCID-anyp-2jr7-73a1 |
|
| 16 |
| vulnerability |
VCID-b5pd-kk97-gban |
|
| 17 |
| vulnerability |
VCID-bd1g-sfsp-37h7 |
|
| 18 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 19 |
| vulnerability |
VCID-cbqr-aybx-d3e6 |
|
| 20 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 21 |
| vulnerability |
VCID-d8yf-8rff-3yhf |
|
| 22 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 23 |
| vulnerability |
VCID-dtza-65ku-aber |
|
| 24 |
| vulnerability |
VCID-emmr-15qp-vfah |
|
| 25 |
| vulnerability |
VCID-f1zu-xb4j-8qhp |
|
| 26 |
| vulnerability |
VCID-fnck-7mvx-hqc9 |
|
| 27 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 28 |
| vulnerability |
VCID-gdg8-aejn-83c4 |
|
| 29 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 30 |
| vulnerability |
VCID-jcjk-s89c-mbbm |
|
| 31 |
| vulnerability |
VCID-jvq6-xjbu-fkb9 |
|
| 32 |
| vulnerability |
VCID-kdw5-8y5z-zya5 |
|
| 33 |
| vulnerability |
VCID-kefv-kpkk-wudf |
|
| 34 |
| vulnerability |
VCID-mntx-6yku-3qcx |
|
| 35 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 36 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 37 |
| vulnerability |
VCID-p5aw-n691-nkff |
|
| 38 |
| vulnerability |
VCID-pcme-bwan-3bcf |
|
| 39 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 40 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 41 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 42 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 43 |
| vulnerability |
VCID-ruf5-255v-sfdb |
|
| 44 |
| vulnerability |
VCID-sd54-b8z1-2fg7 |
|
| 45 |
| vulnerability |
VCID-sd7w-6qv5-73ge |
|
| 46 |
| vulnerability |
VCID-sdc2-fcap-abaz |
|
| 47 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 48 |
| vulnerability |
VCID-tv15-dcnu-pbbn |
|
| 49 |
| vulnerability |
VCID-utfe-h3b7-jqcj |
|
| 50 |
| vulnerability |
VCID-uvpj-a8v5-ebgz |
|
| 51 |
| vulnerability |
VCID-vpdn-g1k9-1kdn |
|
| 52 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 53 |
| vulnerability |
VCID-x44m-x33k-hydn |
|
| 54 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 55 |
| vulnerability |
VCID-xbsu-ac6g-53fn |
|
| 56 |
| vulnerability |
VCID-y4hn-6bv6-jugw |
|
| 57 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 58 |
| vulnerability |
VCID-yx7r-r7ez-7uhp |
|
| 59 |
| vulnerability |
VCID-z9t9-bxf9-hkfk |
|
| 60 |
| vulnerability |
VCID-zab9-9tqj-hbhg |
|
| 61 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 62 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
| 63 |
| vulnerability |
VCID-zx14-t8et-ufcq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.2 |
|
|
| aliases |
CVE-2026-22770, GHSA-39h3-g67r-7g3c
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-569d-6nue-5kbq |
|
| 8 |
| url |
VCID-5uyd-bv33-h7g1 |
| vulnerability_id |
VCID-5uyd-bv33-h7g1 |
| summary |
ImageMagick: Heap overflow in sun decoder on 32-bit systems may result in out of bounds write
An Integer Overflow vulnerability exists in the sun decoder. On 32-bit systems/builds, a carefully crafted image can lead to an out of bounds heap write.
```
=================================================================
==1967675==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xf190b50e at pc 0x5eae8777 bp 0xffb0fdd8 sp 0xffb0fdd0
WRITE of size 1 at 0xf190b50e thread T0
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25897 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06013 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06084 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.0608 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06044 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06456 |
| published_at |
2026-05-07T12:55:00Z |
|
| 5 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06342 |
| published_at |
2026-05-05T12:55:00Z |
|
| 6 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06572 |
| published_at |
2026-05-14T12:55:00Z |
|
| 7 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06555 |
| published_at |
2026-05-12T12:55:00Z |
|
| 8 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06544 |
| published_at |
2026-05-11T12:55:00Z |
|
| 9 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06531 |
| published_at |
2026-05-09T12:55:00Z |
|
| 10 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19158 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.1939 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19441 |
| published_at |
2026-04-04T12:55:00Z |
|
| 13 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19237 |
| published_at |
2026-04-08T12:55:00Z |
|
| 14 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.1929 |
| published_at |
2026-04-09T12:55:00Z |
|
| 15 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19295 |
| published_at |
2026-04-11T12:55:00Z |
|
| 16 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19248 |
| published_at |
2026-04-12T12:55:00Z |
|
| 17 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19194 |
| published_at |
2026-04-13T12:55:00Z |
|
| 18 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19153 |
| published_at |
2026-04-16T12:55:00Z |
|
| 19 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19162 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25897 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25897, GHSA-6j5f-24fw-pqp4
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5uyd-bv33-h7g1 |
|
| 9 |
| url |
VCID-5xqd-gf3b-4ygw |
| vulnerability_id |
VCID-5xqd-gf3b-4ygw |
| summary |
ImageMagick's Security Policy Bypass through config/policy-secure.xml via "fd handler" leads to stdin/stdout access
The shipped “secure” security policy includes a rule intended to prevent reading/writing from standard streams:
```xml
<policy domain="path" rights="none" pattern="-"/>
```
However, ImageMagick also supports fd:<n> pseudo-filenames (e.g., fd:0, fd:1). This path form is not blocked by the secure policy templates, and therefore bypasses the protection goal of “no stdin/stdout”.
To resolve this, users can add the following change to their security policy.
```xml
<policy domain="path" rights="none" pattern="fd:*"/>
```
And this will also be included in ImageMagick's more secure policies by default. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25966 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03335 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00351 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00352 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00332 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00328 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00334 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00337 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00338 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0034 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00342 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00355 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00347 |
| published_at |
2026-04-29T12:55:00Z |
|
| 12 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00501 |
| published_at |
2026-05-12T12:55:00Z |
|
| 13 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00516 |
| published_at |
2026-05-05T12:55:00Z |
|
| 14 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00515 |
| published_at |
2026-05-07T12:55:00Z |
|
| 15 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0051 |
| published_at |
2026-05-09T12:55:00Z |
|
| 16 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00503 |
| published_at |
2026-05-14T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25966 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25966, GHSA-xwc6-v6g8-pw2h
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5xqd-gf3b-4ygw |
|
| 10 |
| url |
VCID-5zkt-kcgx-a3e2 |
| vulnerability_id |
VCID-5zkt-kcgx-a3e2 |
| summary |
ImageMagick Has Signed Integer Overflow in SIXEL Decoder, Leading to Memory Corruption
A signed integer overflow vulnerability in ImageMagick's SIXEL decoder allows an attacker to trigger memory corruption and denial of service when processing a maliciously crafted SIXEL image file. The vulnerability occurs during buffer reallocation operations where pointer arithmetic using signed 32-bit integers overflows.
```
AddressSanitizer:DEADLYSIGNAL
=================================================================
==143838==ERROR: AddressSanitizer: UNKNOWN SIGNAL on unknown address 0x000000000000
#0 0x7f379d5adb53 (/lib/x86_64-linux-gnu/libc.so.6+0xc4b53)
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25970 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17646 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.1769 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17714 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17805 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17767 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17757 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17815 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17864 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17908 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17892 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17989 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.18043 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17831 |
| published_at |
2026-04-08T12:55:00Z |
|
| 13 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17743 |
| published_at |
2026-04-07T12:55:00Z |
|
| 14 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18583 |
| published_at |
2026-05-14T12:55:00Z |
|
| 15 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18299 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18384 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18486 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18454 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18485 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25970 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25970, GHSA-xg29-8ghv-v4xr
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5zkt-kcgx-a3e2 |
|
| 11 |
| url |
VCID-62ar-kwbq-nyh3 |
| vulnerability_id |
VCID-62ar-kwbq-nyh3 |
| summary |
ImageMagick has memory leak in msl encoder
Memory leak exists in `coders/msl.c`. In the `WriteMSLImage` function of the `msl.c` file, resources are allocated. But the function returns early without releasing these allocated resources.
```
==78983== Memcheck, a memory error detector
==78983== Copyright (C) 2002-2022, and GNU GPL'd, by Julian Seward et al.
==78983== Using Valgrind-3.22.0 and LibVEX; rerun with -h for copyright info
==78983==
==78983== 177,196 (13,512 direct, 163,684 indirect) bytes in 1 blocks are definitely lost in loss record 21 of 21
==78983== at 0x4846828: malloc (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so)
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25638 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05154 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05112 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05082 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04934 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04924 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04978 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04997 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05015 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05035 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05019 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04968 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04986 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05611 |
| published_at |
2026-05-14T12:55:00Z |
|
| 13 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05478 |
| published_at |
2026-05-05T12:55:00Z |
|
| 14 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05523 |
| published_at |
2026-05-07T12:55:00Z |
|
| 15 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05599 |
| published_at |
2026-05-09T12:55:00Z |
|
| 16 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05606 |
| published_at |
2026-05-11T12:55:00Z |
|
| 17 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05607 |
| published_at |
2026-05-12T12:55:00Z |
|
| 18 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18616 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25638 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25638, GHSA-gxcx-qjqp-8vjw
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-62ar-kwbq-nyh3 |
|
| 12 |
| url |
VCID-69f6-ceje-hyah |
| vulnerability_id |
VCID-69f6-ceje-hyah |
| summary |
ImageMagick: Malicious PCD files trigger 1‑byte heap Out-of-bounds Read and DoS
The PCD coder’s DecodeImage loop allows a crafted PCD file to trigger a 1‑byte heap out-of-bounds read when decoding an image (Denial of service) and potential disclosure of adjacent heap byte. |
| references |
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
GHSA-wgxp-q8xq-wpp9
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-69f6-ceje-hyah |
|
| 13 |
| url |
VCID-6h7x-3rue-kucp |
| vulnerability_id |
VCID-6h7x-3rue-kucp |
| summary |
ImageMagick has a heap buffer over-read via 32-bit integer overflow in MAT decoder
In MAT decoder uses 32-bit arithmetic due to incorrect parenthesization resulting in a heap over-read.
```
=================================================================
==969652==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x506000003b40 at pc 0x555557b2a926 bp 0x7fffffff4c80 sp 0x7fffffff4c70
READ of size 8 at 0x506000003b40 thread T0
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-28692 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05673 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05647 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05608 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05611 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05574 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06551 |
| published_at |
2026-05-14T12:55:00Z |
|
| 6 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06128 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06089 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.061 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06248 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06264 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06291 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06304 |
| published_at |
2026-04-29T12:55:00Z |
|
| 13 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06324 |
| published_at |
2026-05-05T12:55:00Z |
|
| 14 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06438 |
| published_at |
2026-05-07T12:55:00Z |
|
| 15 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06511 |
| published_at |
2026-05-09T12:55:00Z |
|
| 16 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06522 |
| published_at |
2026-05-11T12:55:00Z |
|
| 17 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06534 |
| published_at |
2026-05-12T12:55:00Z |
|
| 18 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06139 |
| published_at |
2026-04-11T12:55:00Z |
|
| 19 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06135 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-28692 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-28692, GHSA-mrmj-x24c-wwcv
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6h7x-3rue-kucp |
|
| 14 |
| url |
VCID-6meg-yjby-a7gj |
| vulnerability_id |
VCID-6meg-yjby-a7gj |
| summary |
ImageMagick has a Memory Leak in LoadOpenCLDeviceBenchmark() when parsing malformed XML
### Summary
A memory leak vulnerability exists in the `LoadOpenCLDeviceBenchmark()` function in `MagickCore/opencl.c`. When parsing a malformed OpenCL device profile XML file that contains `<device` elements without proper `/>` closing tags, the function fails to release allocated memory for string members (`platform_name`, `vendor_name`, `name`, `version`), leading to memory leaks that could result in resource exhaustion.
**Affected Version**: ImageMagick 7.1.2-12 and possibly earlier versions
---
### Details
The vulnerability is located in `MagickCore/opencl.c`, function `LoadOpenCLDeviceBenchmark()` (lines 754-911).
**Root Cause Analysis:**
1. When a `<device` tag is encountered, a `MagickCLDeviceBenchmark` structure is allocated (line 807-812)
2. String attributes (`platform`, `vendor`, `name`, `version`) are allocated via `ConstantString()` (lines 878, 885, 898, 900)
3. These strings are **only freed** when a `/>` closing tag is encountered (lines 840-849)
4. At function exit (lines 908-910), only the `device_benchmark` structure is freed, but **its member variables are not freed** if `/>` was never parsed
**Vulnerable Code (lines 908-910):**
```c
token=(char *) RelinquishMagickMemory(token);
device_benchmark=(MagickCLDeviceBenchmark *) RelinquishMagickMemory(
device_benchmark); // BUG: members (platform_name, vendor_name, name, version) not freed!
```
**Correct cleanup (only executed when `/>` is found, lines 840-849):**
```c
device_benchmark->platform_name=(char *) RelinquishMagickMemory(device_benchmark->platform_name);
device_benchmark->vendor_name=(char *) RelinquishMagickMemory(device_benchmark->vendor_name);
device_benchmark->name=(char *) RelinquishMagickMemory(device_benchmark->name);
device_benchmark->version=(char *) RelinquishMagickMemory(device_benchmark->version);
device_benchmark=(MagickCLDeviceBenchmark *) RelinquishMagickMemory(device_benchmark);
```
---
### PoC
**Environment:**
- OS: Ubuntu 22.04.5 LTS (Linux 6.8.0-87-generic x86_64)
- Compiler: GCC 11.4.0
- ImageMagick: 7.1.2-13 (commit `a52c1b402be08ef8ae193f28ac5b2e120f2fa26f`)
**Step 1: Build ImageMagick with AddressSanitizer**
```bash
cd ImageMagick
./configure \
CFLAGS="-g -O0 -fsanitize=address -fno-omit-frame-pointer" \
CXXFLAGS="-g -O0 -fsanitize=address -fno-omit-frame-pointer" \
LDFLAGS="-fsanitize=address" \
--disable-openmp
make -j$(nproc)
```
**Step 2: Create malformed XML file**
**Step 3: Place file in OpenCL cache directory**
```bash
mkdir -p ~/.cache/ImageMagick
cp malformed_opencl_profile.xml ~/.cache/ImageMagick/ImagemagickOpenCLDeviceProfile.xml
```
**Step 4: Run ImageMagick with leak detection**
```bash
export ASAN_OPTIONS="detect_leaks=1:symbolize=1"
./utilities/magick -size 100x100 xc:red output.png
```
**ASAN Output:**
```
=================================================================
==2543490==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 96 byte(s) in 2 object(s) allocated from:
#0 ... in AcquireMagickMemory MagickCore/memory.c:536
#1 ... in LoadOpenCLDeviceBenchmark MagickCore/opencl.c:807
Direct leak of 16 byte(s) in 1 object(s) allocated from:
#0 ... in ConstantString MagickCore/string.c:692
#1 ... in LoadOpenCLDeviceBenchmark MagickCore/opencl.c:878 ← name
Direct leak of 14 byte(s) in 1 object(s) allocated from:
#0 ... in ConstantString MagickCore/string.c:692
#1 ... in LoadOpenCLDeviceBenchmark MagickCore/opencl.c:885 ← platform_name
Direct leak of 14 byte(s) in 1 object(s) allocated from:
#0 ... in ConstantString MagickCore/string.c:692
#1 ... in LoadOpenCLDeviceBenchmark MagickCore/opencl.c:898 ← vendor_name
Direct leak of 15 byte(s) in 1 object(s) allocated from:
#0 ... in ConstantString MagickCore/string.c:692
#1 ... in LoadOpenCLDeviceBenchmark MagickCore/opencl.c:900 ← version
SUMMARY: AddressSanitizer: 203 byte(s) leaked in 18 allocation(s).
```
---
### Impact
**Vulnerability Type:** CWE-401 (Missing Release of Memory after Effective Lifetime)
**Severity:** Low
**Who is impacted:**
- Users who have OpenCL enabled in ImageMagick
- Systems where an attacker can place or modify files in the OpenCL cache directory (`~/.cache/ImageMagick/`)
- Long-running ImageMagick processes or services that repeatedly initialize OpenCL
**Potential consequences:**
- Memory exhaustion over time if the malformed configuration is repeatedly loaded
- Denial of Service (DoS) in resource-constrained environments
**Attack Vector:** Local - requires write access to the user's OpenCL cache directory |
| references |
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.2 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-15ny-qqbj-qyfk |
|
| 1 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 2 |
| vulnerability |
VCID-29r3-kvf4-n3hc |
|
| 3 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 4 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 5 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 6 |
| vulnerability |
VCID-5uyd-bv33-h7g1 |
|
| 7 |
| vulnerability |
VCID-5xqd-gf3b-4ygw |
|
| 8 |
| vulnerability |
VCID-5zkt-kcgx-a3e2 |
|
| 9 |
| vulnerability |
VCID-62ar-kwbq-nyh3 |
|
| 10 |
| vulnerability |
VCID-69f6-ceje-hyah |
|
| 11 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 12 |
| vulnerability |
VCID-6rma-wjdv-uqe9 |
|
| 13 |
| vulnerability |
VCID-6ztv-auh8-27gx |
|
| 14 |
| vulnerability |
VCID-acsa-1uwk-fqee |
|
| 15 |
| vulnerability |
VCID-anyp-2jr7-73a1 |
|
| 16 |
| vulnerability |
VCID-b5pd-kk97-gban |
|
| 17 |
| vulnerability |
VCID-bd1g-sfsp-37h7 |
|
| 18 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 19 |
| vulnerability |
VCID-cbqr-aybx-d3e6 |
|
| 20 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 21 |
| vulnerability |
VCID-d8yf-8rff-3yhf |
|
| 22 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 23 |
| vulnerability |
VCID-dtza-65ku-aber |
|
| 24 |
| vulnerability |
VCID-emmr-15qp-vfah |
|
| 25 |
| vulnerability |
VCID-f1zu-xb4j-8qhp |
|
| 26 |
| vulnerability |
VCID-fnck-7mvx-hqc9 |
|
| 27 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 28 |
| vulnerability |
VCID-gdg8-aejn-83c4 |
|
| 29 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 30 |
| vulnerability |
VCID-jcjk-s89c-mbbm |
|
| 31 |
| vulnerability |
VCID-jvq6-xjbu-fkb9 |
|
| 32 |
| vulnerability |
VCID-kdw5-8y5z-zya5 |
|
| 33 |
| vulnerability |
VCID-kefv-kpkk-wudf |
|
| 34 |
| vulnerability |
VCID-mntx-6yku-3qcx |
|
| 35 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 36 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 37 |
| vulnerability |
VCID-p5aw-n691-nkff |
|
| 38 |
| vulnerability |
VCID-pcme-bwan-3bcf |
|
| 39 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 40 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 41 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 42 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 43 |
| vulnerability |
VCID-ruf5-255v-sfdb |
|
| 44 |
| vulnerability |
VCID-sd54-b8z1-2fg7 |
|
| 45 |
| vulnerability |
VCID-sd7w-6qv5-73ge |
|
| 46 |
| vulnerability |
VCID-sdc2-fcap-abaz |
|
| 47 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 48 |
| vulnerability |
VCID-tv15-dcnu-pbbn |
|
| 49 |
| vulnerability |
VCID-utfe-h3b7-jqcj |
|
| 50 |
| vulnerability |
VCID-uvpj-a8v5-ebgz |
|
| 51 |
| vulnerability |
VCID-vpdn-g1k9-1kdn |
|
| 52 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 53 |
| vulnerability |
VCID-x44m-x33k-hydn |
|
| 54 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 55 |
| vulnerability |
VCID-xbsu-ac6g-53fn |
|
| 56 |
| vulnerability |
VCID-y4hn-6bv6-jugw |
|
| 57 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 58 |
| vulnerability |
VCID-yx7r-r7ez-7uhp |
|
| 59 |
| vulnerability |
VCID-z9t9-bxf9-hkfk |
|
| 60 |
| vulnerability |
VCID-zab9-9tqj-hbhg |
|
| 61 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 62 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
| 63 |
| vulnerability |
VCID-zx14-t8et-ufcq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.2 |
|
|
| aliases |
GHSA-qp59-x883-77qv
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6meg-yjby-a7gj |
|
| 15 |
| url |
VCID-6rma-wjdv-uqe9 |
| vulnerability_id |
VCID-6rma-wjdv-uqe9 |
| summary |
mageMagick has a possible use-after-free write in its PDB decoder
A use-after-free vulnerability exists in the PDB decoder that will use a stale pointer when a memory allocation fails and that could result in a crash or a single zero byte write.
```
==4033155==ERROR: AddressSanitizer: UNKNOWN SIGNAL on unknown address 0x000000000000 (pc 0x5589c1971b24 bp 0x7ffdcc7ae2d0 sp 0x7ffdcc7adb20 T0)
```
```
==4034812==ERROR: AddressSanitizer: heap-use-after-free on address 0x7f099e9f7800 at pc 0x5605d909ab20 bp 0x7ffe52045b50 sp 0x7ffe52045b40
WRITE of size 1 at 0x7f099e9f7800 thread T0
``` |
| references |
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
GHSA-3j4x-rwrx-xxj9
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6rma-wjdv-uqe9 |
|
| 16 |
| url |
VCID-6ztv-auh8-27gx |
| vulnerability_id |
VCID-6ztv-auh8-27gx |
| summary |
ImageMagick: Memory Leak in multiple coders that write raw pixel data
A memory leak vulnerability exists in multiple coders that write raw pixel data where an object is not freed.
```
Direct leak of 160 byte(s) in 1 object(s) allocated from:
``` |
| references |
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
GHSA-wfx3-6g53-9fgc
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6ztv-auh8-27gx |
|
| 17 |
| url |
VCID-acsa-1uwk-fqee |
| vulnerability_id |
VCID-acsa-1uwk-fqee |
| summary |
ImageMagick has Possible Heap Information Disclosure in PSD ZIP Decompression
### Description
A heap information disclosure vulnerability exists in ImageMagick's PSD (Adobe Photoshop) format handler. When processing a maliciously crafted PSD file containing ZIP-compressed layer data that decompresses to less than the expected size, uninitialized heap memory is leaked into the output image.
### Expected Impact
Information disclosure leading to potential exposure of sensitive data from server memory. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-24481 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04469 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03957 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03926 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03909 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03881 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0386 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0387 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03991 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04003 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04009 |
| published_at |
2026-04-26T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04054 |
| published_at |
2026-04-29T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04399 |
| published_at |
2026-05-05T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04426 |
| published_at |
2026-05-07T12:55:00Z |
|
| 13 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04461 |
| published_at |
2026-05-09T12:55:00Z |
|
| 14 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04463 |
| published_at |
2026-05-11T12:55:00Z |
|
| 15 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04466 |
| published_at |
2026-05-12T12:55:00Z |
|
| 16 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03914 |
| published_at |
2026-04-04T12:55:00Z |
|
| 17 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03928 |
| published_at |
2026-04-07T12:55:00Z |
|
| 18 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03934 |
| published_at |
2026-04-08T12:55:00Z |
|
| 19 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14453 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-24481 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-24481, GHSA-96pc-27rx-pr36
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-acsa-1uwk-fqee |
|
| 18 |
| url |
VCID-anyp-2jr7-73a1 |
| vulnerability_id |
VCID-anyp-2jr7-73a1 |
| summary |
ImageMagick has a possible heap Use After Free vulnerability in its meta coder
A heap Use After Free vulnerability exists in the meta coder when an allocation fails and a single byte is written to a stale pointer.
```
==535852==ERROR: AddressSanitizer: heap-use-after-free on address 0x5210000088ff at pc 0x5581bacac14d bp 0x7ffdf667edf0 sp 0x7ffdf667ede0
WRITE of size 1 at 0x5210000088ff thread T0
``` |
| references |
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
GHSA-2gq3-ww97-wfjm
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-anyp-2jr7-73a1 |
|
| 19 |
| url |
VCID-b43n-3d1g-u3fe |
| vulnerability_id |
VCID-b43n-3d1g-u3fe |
| summary |
ImageMagick's failure to limit MVG mutual causes Stack Overflow
Magick fails to check for circular references between two MVGs, leading to a stack overflow. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-68950 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06645 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0665 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06636 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06625 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06475 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06467 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06532 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06541 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06548 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06553 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06438 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06512 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06474 |
| published_at |
2026-04-04T12:55:00Z |
|
| 13 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06462 |
| published_at |
2026-04-07T12:55:00Z |
|
| 14 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.09094 |
| published_at |
2026-05-14T12:55:00Z |
|
| 15 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08811 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.0896 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.09033 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08997 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.09026 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-68950 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.1 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-15ny-qqbj-qyfk |
|
| 1 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 2 |
| vulnerability |
VCID-29r3-kvf4-n3hc |
|
| 3 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 4 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 5 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 6 |
| vulnerability |
VCID-569d-6nue-5kbq |
|
| 7 |
| vulnerability |
VCID-5uyd-bv33-h7g1 |
|
| 8 |
| vulnerability |
VCID-5xqd-gf3b-4ygw |
|
| 9 |
| vulnerability |
VCID-5zkt-kcgx-a3e2 |
|
| 10 |
| vulnerability |
VCID-62ar-kwbq-nyh3 |
|
| 11 |
| vulnerability |
VCID-69f6-ceje-hyah |
|
| 12 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 13 |
| vulnerability |
VCID-6meg-yjby-a7gj |
|
| 14 |
| vulnerability |
VCID-6rma-wjdv-uqe9 |
|
| 15 |
| vulnerability |
VCID-6ztv-auh8-27gx |
|
| 16 |
| vulnerability |
VCID-acsa-1uwk-fqee |
|
| 17 |
| vulnerability |
VCID-anyp-2jr7-73a1 |
|
| 18 |
| vulnerability |
VCID-b5pd-kk97-gban |
|
| 19 |
| vulnerability |
VCID-bd1g-sfsp-37h7 |
|
| 20 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 21 |
| vulnerability |
VCID-cbqr-aybx-d3e6 |
|
| 22 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 23 |
| vulnerability |
VCID-d8yf-8rff-3yhf |
|
| 24 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 25 |
| vulnerability |
VCID-dtza-65ku-aber |
|
| 26 |
| vulnerability |
VCID-emmr-15qp-vfah |
|
| 27 |
| vulnerability |
VCID-f1zu-xb4j-8qhp |
|
| 28 |
| vulnerability |
VCID-fnck-7mvx-hqc9 |
|
| 29 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 30 |
| vulnerability |
VCID-gdg8-aejn-83c4 |
|
| 31 |
| vulnerability |
VCID-h221-qd8d-tqa5 |
|
| 32 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 33 |
| vulnerability |
VCID-jcjk-s89c-mbbm |
|
| 34 |
| vulnerability |
VCID-jvq6-xjbu-fkb9 |
|
| 35 |
| vulnerability |
VCID-kdw5-8y5z-zya5 |
|
| 36 |
| vulnerability |
VCID-kefv-kpkk-wudf |
|
| 37 |
| vulnerability |
VCID-mntx-6yku-3qcx |
|
| 38 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 39 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 40 |
| vulnerability |
VCID-p5aw-n691-nkff |
|
| 41 |
| vulnerability |
VCID-pcme-bwan-3bcf |
|
| 42 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 43 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 44 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 45 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 46 |
| vulnerability |
VCID-ruf5-255v-sfdb |
|
| 47 |
| vulnerability |
VCID-sd54-b8z1-2fg7 |
|
| 48 |
| vulnerability |
VCID-sd7w-6qv5-73ge |
|
| 49 |
| vulnerability |
VCID-sdc2-fcap-abaz |
|
| 50 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 51 |
| vulnerability |
VCID-tv15-dcnu-pbbn |
|
| 52 |
| vulnerability |
VCID-utfe-h3b7-jqcj |
|
| 53 |
| vulnerability |
VCID-uvpj-a8v5-ebgz |
|
| 54 |
| vulnerability |
VCID-vaks-d4k5-zue7 |
|
| 55 |
| vulnerability |
VCID-vpdn-g1k9-1kdn |
|
| 56 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 57 |
| vulnerability |
VCID-x44m-x33k-hydn |
|
| 58 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 59 |
| vulnerability |
VCID-xbsu-ac6g-53fn |
|
| 60 |
| vulnerability |
VCID-y4hn-6bv6-jugw |
|
| 61 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 62 |
| vulnerability |
VCID-yx7r-r7ez-7uhp |
|
| 63 |
| vulnerability |
VCID-z9t9-bxf9-hkfk |
|
| 64 |
| vulnerability |
VCID-zab9-9tqj-hbhg |
|
| 65 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 66 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
| 67 |
| vulnerability |
VCID-zx14-t8et-ufcq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.1 |
|
|
| aliases |
CVE-2025-68950, GHSA-7rvh-xqp3-pr8j
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b43n-3d1g-u3fe |
|
| 20 |
| url |
VCID-b5pd-kk97-gban |
| vulnerability_id |
VCID-b5pd-kk97-gban |
| summary |
ImageMagick: Converting multi-layer nested MVG to SVG can cause DoS
Magick fails to check for multi-layer nested mvg conversions to svg, leading to DoS. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-24484 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0453 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0469 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04656 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04614 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04468 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04498 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04477 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04489 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04524 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04541 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04515 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04716 |
| published_at |
2026-04-29T12:55:00Z |
|
| 12 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05141 |
| published_at |
2026-05-14T12:55:00Z |
|
| 13 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05143 |
| published_at |
2026-05-12T12:55:00Z |
|
| 14 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05139 |
| published_at |
2026-05-09T12:55:00Z |
|
| 15 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0509 |
| published_at |
2026-05-07T12:55:00Z |
|
| 16 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05042 |
| published_at |
2026-05-05T12:55:00Z |
|
| 17 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17539 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-24484 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-24484, GHSA-wg3g-gvx5-2pmv
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b5pd-kk97-gban |
|
| 21 |
| url |
VCID-bd1g-sfsp-37h7 |
| vulnerability_id |
VCID-bd1g-sfsp-37h7 |
| summary |
ImageMagick: Stack buffer overflow in FTXT reader via oversized integer field
### Summary
A stack-based buffer overflow exists in the ImageMagick FTXT image reader. A crafted FTXT file can cause out-of-bounds writes on the stack, leading to a crash.
```
=================================================================
==3537074==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffee4850ef0 at pc 0x5607c408fb33 bp 0x7ffee484fe50 sp 0x7ffee484fe40
WRITE of size 1 at 0x7ffee4850ef0 thread T0
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25967 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04879 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04961 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04955 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04916 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05291 |
| published_at |
2026-05-07T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05242 |
| published_at |
2026-05-05T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05346 |
| published_at |
2026-05-14T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05342 |
| published_at |
2026-05-12T12:55:00Z |
|
| 8 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05344 |
| published_at |
2026-05-11T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05335 |
| published_at |
2026-05-09T12:55:00Z |
|
| 10 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17899 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.18055 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.1811 |
| published_at |
2026-04-04T12:55:00Z |
|
| 13 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17811 |
| published_at |
2026-04-07T12:55:00Z |
|
| 14 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.1796 |
| published_at |
2026-04-09T12:55:00Z |
|
| 15 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17976 |
| published_at |
2026-04-11T12:55:00Z |
|
| 16 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17931 |
| published_at |
2026-04-12T12:55:00Z |
|
| 17 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17882 |
| published_at |
2026-04-13T12:55:00Z |
|
| 18 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17825 |
| published_at |
2026-04-16T12:55:00Z |
|
| 19 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17835 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25967 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25967, GHSA-72hf-fj62-w6j4
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bd1g-sfsp-37h7 |
|
| 22 |
| url |
VCID-bw4q-dt1r-y3e4 |
| vulnerability_id |
VCID-bw4q-dt1r-y3e4 |
| summary |
ImageMagick has heap-based buffer overflow in UHDR encoder
A heap-based buffer overflow in the UHDR encoder can happen due to truncation of a value and it would allow an out of bounds write.
```
================================================================
==2158399==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x521000039500 at pc 0x562a4a42f968 bp 0x7ffcca4ed6c0 sp 0x7ffcca4ed6b0
WRITE of size 1 at 0x521000039500 thread T0
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-30931 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02811 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02791 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02787 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02779 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02764 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04123 |
| published_at |
2026-05-14T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03899 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03878 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03889 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04009 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04019 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04026 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04071 |
| published_at |
2026-04-29T12:55:00Z |
|
| 13 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04031 |
| published_at |
2026-05-05T12:55:00Z |
|
| 14 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04045 |
| published_at |
2026-05-07T12:55:00Z |
|
| 15 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04078 |
| published_at |
2026-05-09T12:55:00Z |
|
| 16 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04084 |
| published_at |
2026-05-11T12:55:00Z |
|
| 17 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04092 |
| published_at |
2026-05-12T12:55:00Z |
|
| 18 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03945 |
| published_at |
2026-04-11T12:55:00Z |
|
| 19 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03928 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-30931 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-30931, GHSA-h95r-c8c7-mrwx
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bw4q-dt1r-y3e4 |
|
| 23 |
| url |
VCID-cbqr-aybx-d3e6 |
| vulnerability_id |
VCID-cbqr-aybx-d3e6 |
| summary |
ImageMagick has Use After Free in MSLStartElement in "coders/msl.c"
A crafted MSL script triggers a heap-use-after-free. The operation element handler replaces and frees the image while the parser continues reading from it, leading to a UAF in ReadBlobString during further parsing. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25983 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08115 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08151 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.0819 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.0822 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08062 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08076 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.0818 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08197 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08218 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08227 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08209 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08141 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08193 |
| published_at |
2026-04-04T12:55:00Z |
|
| 13 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08147 |
| published_at |
2026-04-02T12:55:00Z |
|
| 14 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08803 |
| published_at |
2026-05-14T12:55:00Z |
|
| 15 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08528 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.0867 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08755 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.0872 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08745 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25983 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25983, GHSA-fwqw-2x5x-w566
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cbqr-aybx-d3e6 |
|
| 24 |
| url |
VCID-cuhw-ew1g-s3h2 |
| vulnerability_id |
VCID-cuhw-ew1g-s3h2 |
| summary |
ImageMagick has Heap Use-After-Free in ImageMagick MSL decoder
A heap use-after-free vulnerability in ImageMagick's MSL decoder allows an attacker to trigger access to freed memory by crafting an MSL file.
```
=================================================================
==1500633==ERROR: AddressSanitizer: heap-use-after-free on address 0x527000011550 at pc 0x5612583fa212 bp 0x7ffedb86d160 sp 0x7ffedb86d150
READ of size 8 at 0x527000011550 thread T0
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-28687 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17042 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16984 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16896 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17114 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17059 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18384 |
| published_at |
2026-05-14T12:55:00Z |
|
| 6 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18421 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18365 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18377 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18402 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18302 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18288 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18246 |
| published_at |
2026-04-29T12:55:00Z |
|
| 13 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18109 |
| published_at |
2026-05-05T12:55:00Z |
|
| 14 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18198 |
| published_at |
2026-05-07T12:55:00Z |
|
| 15 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18298 |
| published_at |
2026-05-09T12:55:00Z |
|
| 16 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18263 |
| published_at |
2026-05-11T12:55:00Z |
|
| 17 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18291 |
| published_at |
2026-05-12T12:55:00Z |
|
| 18 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.1852 |
| published_at |
2026-04-11T12:55:00Z |
|
| 19 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18472 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-28687 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-28687, GHSA-fpvf-frm6-625q
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cuhw-ew1g-s3h2 |
|
| 25 |
| url |
VCID-d8yf-8rff-3yhf |
| vulnerability_id |
VCID-d8yf-8rff-3yhf |
| summary |
ImageMagick has a possible infinite loop in its JPEG encoder when using `jpeg:extent`
A `continue` statement in the JPEG extent binary search loop in the jpeg encoder causes an infinite loop when writing persistently fails. An attacker can trigger a 100% CPU consumption and process hang (Denial of Service) with a crafted image. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-26283 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05183 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0518 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05139 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05114 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04966 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04956 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05016 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05033 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05051 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05072 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05057 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05024 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05003 |
| published_at |
2026-04-04T12:55:00Z |
|
| 13 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04976 |
| published_at |
2026-04-02T12:55:00Z |
|
| 14 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0565 |
| published_at |
2026-05-14T12:55:00Z |
|
| 15 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05516 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05561 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05638 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05644 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05647 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-26283 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-26283, GHSA-gwr3-x37h-h84v
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d8yf-8rff-3yhf |
|
| 26 |
| url |
VCID-dabd-m3mf-3ker |
| vulnerability_id |
VCID-dabd-m3mf-3ker |
| summary |
ImageMagick has Heap Buffer Over-Read in BilateralBlurImage
BilateralBlurImage contains a heap buffer over-read caused by an incorrect conversion. When processing a crafted image with the `-bilateral-blur` operation an out of bounds read can occur.
```
=================================================================
==676172==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x50a0000079c0 at pc 0x57b483c722f7 bp 0x7fffc0acd380 sp 0x7fffc0acd370
READ of size 4 at 0x50a0000079c0 thread T0
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-30935 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02441 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02421 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02416 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02417 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02407 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03151 |
| published_at |
2026-05-14T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02945 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02921 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02931 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03052 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03051 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03039 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03084 |
| published_at |
2026-04-29T12:55:00Z |
|
| 13 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03045 |
| published_at |
2026-05-05T12:55:00Z |
|
| 14 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03067 |
| published_at |
2026-05-07T12:55:00Z |
|
| 15 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03103 |
| published_at |
2026-05-09T12:55:00Z |
|
| 16 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03113 |
| published_at |
2026-05-11T12:55:00Z |
|
| 17 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03118 |
| published_at |
2026-05-12T12:55:00Z |
|
| 18 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02977 |
| published_at |
2026-04-11T12:55:00Z |
|
| 19 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02954 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-30935 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-30935, GHSA-cqw9-w2m7-r2m2
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dabd-m3mf-3ker |
|
| 27 |
| url |
VCID-dtza-65ku-aber |
| vulnerability_id |
VCID-dtza-65ku-aber |
| summary |
ImageMagick has NULL pointer dereference in ReadSFWImage after DestroyImageInfo (sfw.c)
In `ReadSFWImage()` (`coders/sfw.c`), when temporary file creation fails, `read_info` is destroyed before its `filename` member is accessed, causing a NULL pointer dereference and crash.
```
AddressSanitizer:DEADLYSIGNAL
=================================================================
==1414421==ERROR: AddressSanitizer: UNKNOWN SIGNAL on unknown address 0x000000000000 (pc 0x56260222912f bp 0x7ffec0a193b0 sp 0x7ffec0a19360 T0)
#0 0x56260222912f (/data/ylwang/LargeScan/targets/ImageMagick/utilities/magick+0x235f12f)
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25795 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05363 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05364 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05323 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05285 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05133 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0513 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05185 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05199 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05216 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05248 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05229 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05177 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05197 |
| published_at |
2026-04-07T12:55:00Z |
|
| 13 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05816 |
| published_at |
2026-05-14T12:55:00Z |
|
| 14 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05652 |
| published_at |
2026-05-05T12:55:00Z |
|
| 15 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05707 |
| published_at |
2026-05-07T12:55:00Z |
|
| 16 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05795 |
| published_at |
2026-05-09T12:55:00Z |
|
| 17 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05807 |
| published_at |
2026-05-11T12:55:00Z |
|
| 18 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05811 |
| published_at |
2026-05-12T12:55:00Z |
|
| 19 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19112 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25795 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25795, GHSA-p33r-fqw2-rqmm
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dtza-65ku-aber |
|
| 28 |
| url |
VCID-emmr-15qp-vfah |
| vulnerability_id |
VCID-emmr-15qp-vfah |
| summary |
ImageMagick has Global Buffer Overflow (OOB Read) via Negative Pixel Index in UIL and XPM Writer
The UIL and XPM image encoder do not validate the pixel index value returned by `GetPixelIndex()` before using it as an array subscript. In HDRI builds, `Quantum` is a floating-point type, so pixel index values can be negative. An attacker can craft an image with negative pixel index values to trigger a global buffer overflow read during conversion, leading to information disclosure or a process crash.
```
READ of size 1 at 0x55a8823a776e thread T0
#0 0x55a880d01e85 in WriteUILImage coders/uil.c:355
```
```
READ of size 1 at 0x55fa1c04c66e thread T0
#0 0x55fa1a9ee415 in WriteXPMImage coders/xpm.c:1135
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25898 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05778 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05771 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05734 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.057 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05535 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05526 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05579 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05586 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05596 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05624 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.056 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05563 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05562 |
| published_at |
2026-04-07T12:55:00Z |
|
| 13 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06229 |
| published_at |
2026-05-14T12:55:00Z |
|
| 14 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06042 |
| published_at |
2026-05-05T12:55:00Z |
|
| 15 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06138 |
| published_at |
2026-05-07T12:55:00Z |
|
| 16 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06206 |
| published_at |
2026-05-09T12:55:00Z |
|
| 17 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06221 |
| published_at |
2026-05-11T12:55:00Z |
|
| 18 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06223 |
| published_at |
2026-05-12T12:55:00Z |
|
| 19 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18459 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25898 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25898, GHSA-vpxv-r9pg-7gpr
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-emmr-15qp-vfah |
|
| 29 |
| url |
VCID-f1zu-xb4j-8qhp |
| vulnerability_id |
VCID-f1zu-xb4j-8qhp |
| summary |
ImageMagick has a heap buffer over-read in its MAP image decoder
A heap buffer over-read vulnerability exists in the MAP image decoder when processing crafted MAP files, potentially leading to crashes or unintended memory disclosure during image decoding.
```
=================================================================
==4070926==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x502000002b31 at pc 0x56517afbd910 bp 0x7ffc59e90000 sp 0x7ffc59e8fff0
READ of size 1 at 0x502000002b31 thread T0
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25987 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03433 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03388 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03385 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03398 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03275 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03265 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03289 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0331 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03339 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0338 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03359 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03354 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03346 |
| published_at |
2026-04-04T12:55:00Z |
|
| 13 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03334 |
| published_at |
2026-04-02T12:55:00Z |
|
| 14 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03825 |
| published_at |
2026-05-14T12:55:00Z |
|
| 15 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03733 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03752 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03785 |
| published_at |
2026-05-11T12:55:00Z |
|
| 18 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0379 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25987 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25987, GHSA-42p5-62qq-mmh7
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-f1zu-xb4j-8qhp |
|
| 30 |
| url |
VCID-fnck-7mvx-hqc9 |
| vulnerability_id |
VCID-fnck-7mvx-hqc9 |
| summary |
ImageMagick has a heap Buffer Over-read in its DJVU image format handler
A heap Buffer Over-read vulnerability exists in the DJVU image format handler. The vulnerability occurs due to integer truncation when calculating the stride (row size) for pixel buffer allocation. The stride calculation overflows a 32-bit signed integer, resulting in an out-of-bounds memory reads. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-27799 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0338 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03312 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03335 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03363 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03406 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03385 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03365 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03452 |
| published_at |
2026-04-29T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03408 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03402 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03416 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03299 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03288 |
| published_at |
2026-04-16T12:55:00Z |
|
| 13 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03353 |
| published_at |
2026-04-02T12:55:00Z |
|
| 14 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04804 |
| published_at |
2026-05-09T12:55:00Z |
|
| 15 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04759 |
| published_at |
2026-05-07T12:55:00Z |
|
| 16 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04721 |
| published_at |
2026-05-05T12:55:00Z |
|
| 17 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04811 |
| published_at |
2026-05-14T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-27799 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-27799, GHSA-r99p-5442-q2x2
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fnck-7mvx-hqc9 |
|
| 31 |
| url |
VCID-g41y-dv8u-3yf1 |
| vulnerability_id |
VCID-g41y-dv8u-3yf1 |
| summary |
ImageMagick has Heap Buffer Overflow in WaveletDenoiseImage
A crafted image could cause an out of bounds heap write inside the WaveletDenoiseImage method. When processing a crafted image with the -wavelet-denoise operation an out of bounds write can occur.
```
=================================================================
==661320==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x503000002754 at pc 0x5ff45f82c92a bp 0x7fffb732b400 sp 0x7fffb732b3f0
WRITE of size 4 at 0x503000002754 thread T0
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-30936 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04429 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04412 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04378 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04368 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0537 |
| published_at |
2026-05-14T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05099 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05047 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05052 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.052 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05231 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05273 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05277 |
| published_at |
2026-04-29T12:55:00Z |
|
| 13 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05267 |
| published_at |
2026-05-05T12:55:00Z |
|
| 14 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05316 |
| published_at |
2026-05-07T12:55:00Z |
|
| 15 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0536 |
| published_at |
2026-05-09T12:55:00Z |
|
| 16 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05367 |
| published_at |
2026-05-11T12:55:00Z |
|
| 17 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05366 |
| published_at |
2026-05-12T12:55:00Z |
|
| 18 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0513 |
| published_at |
2026-04-11T12:55:00Z |
|
| 19 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05114 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-30936 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-30936, GHSA-5ggv-92r5-cp4p
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g41y-dv8u-3yf1 |
|
| 32 |
| url |
VCID-gdg8-aejn-83c4 |
| vulnerability_id |
VCID-gdg8-aejn-83c4 |
| summary |
ImageMagick: Policy bypass through path traversal allows reading restricted content despite secured policy
ImageMagick’s path security policy is enforced on the raw filename string before the filesystem resolves it. As a result, a policy rule such as /etc/* can be bypassed by a path traversal. The OS resolves the traversal and opens the sensitive file, but the policy matcher only sees the unnormalized path and therefore allows the read. This enables local file disclosure (LFI) even when policy-secure.xml is applied.
Actions to prevent reading from files have been taken. But it make sure writing is also not possible the following should be added to your policy:
```
<policy domain="path" rights="none" pattern="*../*"/>
```
And this will also be included in the project's more secure policies by default. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25965 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.05051 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04413 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04398 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04382 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04348 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04357 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04488 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04515 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04535 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04578 |
| published_at |
2026-04-29T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04956 |
| published_at |
2026-05-05T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.05005 |
| published_at |
2026-05-07T12:55:00Z |
|
| 12 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.05047 |
| published_at |
2026-05-09T12:55:00Z |
|
| 13 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.05053 |
| published_at |
2026-05-12T12:55:00Z |
|
| 14 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04359 |
| published_at |
2026-04-04T12:55:00Z |
|
| 15 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04369 |
| published_at |
2026-04-07T12:55:00Z |
|
| 16 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04402 |
| published_at |
2026-04-08T12:55:00Z |
|
| 17 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04419 |
| published_at |
2026-04-09T12:55:00Z |
|
| 18 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14614 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25965 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25965, GHSA-8jvj-p28h-9gm7
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gdg8-aejn-83c4 |
|
| 33 |
| url |
VCID-h221-qd8d-tqa5 |
| vulnerability_id |
VCID-h221-qd8d-tqa5 |
| summary |
ImageMagick has a NULL pointer dereference in MSL parser via <comment> tag before image load
## Summary
NULL pointer dereference in MSL (Magick Scripting Language) parser when processing `<comment>` tag before any image is loaded.
## Version
- ImageMagick 7.x (tested on current main branch)
- Commit: HEAD
## Steps to Reproduce
### Method 1: Using ImageMagick directly
```bash
magick MSL:poc.msl out.png
```
### Method 2: Using OSS-Fuzz reproduce
```bash
python3 infra/helper.py build_fuzzers imagemagick
python3 infra/helper.py reproduce imagemagick msl_fuzzer poc.msl
```
Or run the fuzzer directly:
```bash
./msl_fuzzer poc.msl
```
## Expected Behavior
ImageMagick should handle the malformed MSL gracefully and return an error message.
## Actual Behavior
```
convert: MagickCore/property.c:297: MagickBooleanType DeleteImageProperty(Image *, const char *): Assertion `image != (Image *) NULL' failed.
Aborted
```
## Root Cause Analysis
In `coders/msl.c:7091`, `MSLEndElement()` calls `DeleteImageProperty()` on `msl_info->image[n]` when handling the `</comment>` end tag without checking if the image is NULL:
```c
if (LocaleCompare((const char *) tag,"comment") == 0 )
{
(void) DeleteImageProperty(msl_info->image[n],"comment"); // No NULL check
...
}
```
When `<comment>` appears before any `<read>` operation, `msl_info->image[n]` is NULL, causing the assertion failure in `DeleteImageProperty()` at `property.c:297`.
## Impact
- **DoS**: Crash via assertion failure (debug builds) or NULL pointer dereference (release builds)
- **Affected**: Any application using ImageMagick to process user-supplied MSL files
## Fuzzer
This issue was discovered using a custom MSL fuzzer:
```cpp
#include <cstdint>
#include <Magick++/Blob.h>
#include <Magick++/Image.h>
#include "utils.cc"
extern "C" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size)
{
if (IsInvalidSize(Size))
return(0);
try
{
const Magick::Blob blob(Data, Size);
Magick::Image image;
image.magick("MSL");
image.fileName("MSL:");
image.read(blob);
}
catch (Magick::Exception)
{
}
return(0);
}
```
This issue was found by Team FuzzingBrain @ Texas A&M University |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-23952 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05938 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05569 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05525 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.0569 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05726 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05762 |
| published_at |
2026-04-26T12:55:00Z |
|
| 6 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05768 |
| published_at |
2026-04-29T12:55:00Z |
|
| 7 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05776 |
| published_at |
2026-05-05T12:55:00Z |
|
| 8 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05853 |
| published_at |
2026-05-07T12:55:00Z |
|
| 9 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05919 |
| published_at |
2026-05-09T12:55:00Z |
|
| 10 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.0593 |
| published_at |
2026-05-11T12:55:00Z |
|
| 11 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05933 |
| published_at |
2026-05-12T12:55:00Z |
|
| 12 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05517 |
| published_at |
2026-04-16T12:55:00Z |
|
| 13 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05553 |
| published_at |
2026-04-07T12:55:00Z |
|
| 14 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.0559 |
| published_at |
2026-04-08T12:55:00Z |
|
| 15 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05615 |
| published_at |
2026-04-09T12:55:00Z |
|
| 16 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05586 |
| published_at |
2026-04-11T12:55:00Z |
|
| 17 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05576 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-23952 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.2 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-15ny-qqbj-qyfk |
|
| 1 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 2 |
| vulnerability |
VCID-29r3-kvf4-n3hc |
|
| 3 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 4 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 5 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 6 |
| vulnerability |
VCID-5uyd-bv33-h7g1 |
|
| 7 |
| vulnerability |
VCID-5xqd-gf3b-4ygw |
|
| 8 |
| vulnerability |
VCID-5zkt-kcgx-a3e2 |
|
| 9 |
| vulnerability |
VCID-62ar-kwbq-nyh3 |
|
| 10 |
| vulnerability |
VCID-69f6-ceje-hyah |
|
| 11 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 12 |
| vulnerability |
VCID-6rma-wjdv-uqe9 |
|
| 13 |
| vulnerability |
VCID-6ztv-auh8-27gx |
|
| 14 |
| vulnerability |
VCID-acsa-1uwk-fqee |
|
| 15 |
| vulnerability |
VCID-anyp-2jr7-73a1 |
|
| 16 |
| vulnerability |
VCID-b5pd-kk97-gban |
|
| 17 |
| vulnerability |
VCID-bd1g-sfsp-37h7 |
|
| 18 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 19 |
| vulnerability |
VCID-cbqr-aybx-d3e6 |
|
| 20 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 21 |
| vulnerability |
VCID-d8yf-8rff-3yhf |
|
| 22 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 23 |
| vulnerability |
VCID-dtza-65ku-aber |
|
| 24 |
| vulnerability |
VCID-emmr-15qp-vfah |
|
| 25 |
| vulnerability |
VCID-f1zu-xb4j-8qhp |
|
| 26 |
| vulnerability |
VCID-fnck-7mvx-hqc9 |
|
| 27 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 28 |
| vulnerability |
VCID-gdg8-aejn-83c4 |
|
| 29 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 30 |
| vulnerability |
VCID-jcjk-s89c-mbbm |
|
| 31 |
| vulnerability |
VCID-jvq6-xjbu-fkb9 |
|
| 32 |
| vulnerability |
VCID-kdw5-8y5z-zya5 |
|
| 33 |
| vulnerability |
VCID-kefv-kpkk-wudf |
|
| 34 |
| vulnerability |
VCID-mntx-6yku-3qcx |
|
| 35 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 36 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 37 |
| vulnerability |
VCID-p5aw-n691-nkff |
|
| 38 |
| vulnerability |
VCID-pcme-bwan-3bcf |
|
| 39 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 40 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 41 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 42 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 43 |
| vulnerability |
VCID-ruf5-255v-sfdb |
|
| 44 |
| vulnerability |
VCID-sd54-b8z1-2fg7 |
|
| 45 |
| vulnerability |
VCID-sd7w-6qv5-73ge |
|
| 46 |
| vulnerability |
VCID-sdc2-fcap-abaz |
|
| 47 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 48 |
| vulnerability |
VCID-tv15-dcnu-pbbn |
|
| 49 |
| vulnerability |
VCID-utfe-h3b7-jqcj |
|
| 50 |
| vulnerability |
VCID-uvpj-a8v5-ebgz |
|
| 51 |
| vulnerability |
VCID-vpdn-g1k9-1kdn |
|
| 52 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 53 |
| vulnerability |
VCID-x44m-x33k-hydn |
|
| 54 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 55 |
| vulnerability |
VCID-xbsu-ac6g-53fn |
|
| 56 |
| vulnerability |
VCID-y4hn-6bv6-jugw |
|
| 57 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 58 |
| vulnerability |
VCID-yx7r-r7ez-7uhp |
|
| 59 |
| vulnerability |
VCID-z9t9-bxf9-hkfk |
|
| 60 |
| vulnerability |
VCID-zab9-9tqj-hbhg |
|
| 61 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 62 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
| 63 |
| vulnerability |
VCID-zx14-t8et-ufcq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.2 |
|
|
| aliases |
CVE-2026-23952, GHSA-5vx3-wx4q-6cj8
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h221-qd8d-tqa5 |
|
| 34 |
| url |
VCID-jc5m-7rvc-2qg6 |
| vulnerability_id |
VCID-jc5m-7rvc-2qg6 |
| summary |
ImageMagick has a heap-buffer-overflow in NewXMLTree which could result in crash
The NewXMLTree method contains a bug that could result in a crash due to an out of write bounds of a single zero byte. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-32636 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04277 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04268 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04297 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04318 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0426 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0434 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04324 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04293 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04281 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04332 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05266 |
| published_at |
2026-05-14T12:55:00Z |
|
| 11 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05103 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05128 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0517 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05174 |
| published_at |
2026-04-29T12:55:00Z |
|
| 15 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05162 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0521 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05256 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05265 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05264 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-32636 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-32636, GHSA-gc62-2v5p-qpmp
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jc5m-7rvc-2qg6 |
|
| 35 |
| url |
VCID-jcjk-s89c-mbbm |
| vulnerability_id |
VCID-jcjk-s89c-mbbm |
| summary |
ImageMagick: Invalid MSL <map> can result in a use after free
The MSL interpreter crashes when processing a invalid `<map>` element that causes it to use an image after it has been freed. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-26983 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03824 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03777 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03774 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03771 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03649 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03638 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03661 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03687 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0371 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03752 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03729 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03726 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03712 |
| published_at |
2026-04-04T12:55:00Z |
|
| 13 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03701 |
| published_at |
2026-04-02T12:55:00Z |
|
| 14 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04305 |
| published_at |
2026-05-14T12:55:00Z |
|
| 15 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04226 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04253 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0429 |
| published_at |
2026-05-11T12:55:00Z |
|
| 18 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04294 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-26983 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-26983, GHSA-w8mw-frc6-r7m8
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jcjk-s89c-mbbm |
|
| 36 |
| url |
VCID-jvq6-xjbu-fkb9 |
| vulnerability_id |
VCID-jvq6-xjbu-fkb9 |
| summary |
ImageMagick: Infinite loop vulnerability when parsing a PCD file
When a PCD file does not contain a valid marker, the DecodeImage() function becomes trapped in an infinite loop while searching for the marker, causing the program to become unresponsive and continuously consume CPU resources, ultimately leading to system resource exhaustion and denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-24485 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.049 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04888 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04849 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04815 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04674 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04666 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04698 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04715 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04733 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04742 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0473 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04682 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04696 |
| published_at |
2026-04-07T12:55:00Z |
|
| 13 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05304 |
| published_at |
2026-05-14T12:55:00Z |
|
| 14 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05196 |
| published_at |
2026-05-05T12:55:00Z |
|
| 15 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05246 |
| published_at |
2026-05-07T12:55:00Z |
|
| 16 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05291 |
| published_at |
2026-05-09T12:55:00Z |
|
| 17 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05301 |
| published_at |
2026-05-11T12:55:00Z |
|
| 18 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05299 |
| published_at |
2026-05-12T12:55:00Z |
|
| 19 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17962 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-24485 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-24485, GHSA-pqgj-2p96-rx85
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jvq6-xjbu-fkb9 |
|
| 37 |
| url |
VCID-kdw5-8y5z-zya5 |
| vulnerability_id |
VCID-kdw5-8y5z-zya5 |
| summary |
ImageMagick: Possible memory leak in ASHLAR encoder
A memory leak in the ASHLAR image writer allows an attacker to exhaust process memory by providing a crafted image that results in small objects that are allocated but never freed.
```
==880062== Memcheck, a memory error detector
==880062== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
==880062== Using Valgrind-3.18.1 and LibVEX; rerun with -h for copyright info
==880062==
==880062==
==880062== HEAP SUMMARY:
==880062== in use at exit: 386,826 bytes in 696 blocks
==880062== total heap usage: 30,523 allocs, 29,827 frees, 21,803,756 bytes allocated
==880062==
==880062== LEAK SUMMARY:
==880062== definitely lost: 3,408 bytes in 3 blocks
==880062== indirectly lost: 88,885 bytes in 30 blocks
==880062== possibly lost: 140,944 bytes in 383 blocks
==880062== still reachable: 151,573 bytes in 259 blocks
==880062== suppressed: 0 bytes in 0 blocks
==880062== Reachable blocks (those to which a pointer was found) are not shown.
==880062== To see them, rerun with: --leak-check=full --show-leak-kinds=all
==880062==
==880062== For lists of detected and suppressed errors, rerun with: -s
==880062== ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 0 from 0)
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25637 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04614 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04716 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0469 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04656 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05042 |
| published_at |
2026-05-05T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05141 |
| published_at |
2026-05-14T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05143 |
| published_at |
2026-05-12T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05139 |
| published_at |
2026-05-09T12:55:00Z |
|
| 8 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0509 |
| published_at |
2026-05-07T12:55:00Z |
|
| 9 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17366 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17539 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17584 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17458 |
| published_at |
2026-04-08T12:55:00Z |
|
| 13 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17517 |
| published_at |
2026-04-09T12:55:00Z |
|
| 14 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.1753 |
| published_at |
2026-04-11T12:55:00Z |
|
| 15 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17481 |
| published_at |
2026-04-12T12:55:00Z |
|
| 16 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17429 |
| published_at |
2026-04-13T12:55:00Z |
|
| 17 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17372 |
| published_at |
2026-04-16T12:55:00Z |
|
| 18 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.1738 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25637 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25637, GHSA-gm37-qx7w-p258
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kdw5-8y5z-zya5 |
|
| 38 |
| url |
VCID-kefv-kpkk-wudf |
| vulnerability_id |
VCID-kefv-kpkk-wudf |
| summary |
ImageMagick has Division-by-Zero in YUV sampling factor validation, which leads to crash
A logic error in YUV sampling factor validation allows an invalid sampling factor to bypass checks and trigger a division-by-zero during image loading, resulting in a reliable denial-of-service.
```
coders/yuv.c:210:47: runtime error: division by zero
AddressSanitizer:DEADLYSIGNAL
=================================================================
==3543373==ERROR: AddressSanitizer: UNKNOWN SIGNAL on unknown address 0x000000000000 (pc 0x55deeb4d723c bp 0x7fffc28d34d0 sp 0x7fffc28d3320 T0)
#0 0x55deeb4d723c in ReadYUVImage coders/yuv.c:210
#1 0x55deeb751dff in ReadImage MagickCore/constitute.c:743
#2 0x55deeb756374 in ReadImages MagickCore/constitute.c:1082
#3 0x55deec682375 in CLINoImageOperator MagickWand/operation.c:4959
#4 0x55deec6887ed in CLIOption MagickWand/operation.c:5473
#5 0x55deec32843b in ProcessCommandOptions MagickWand/magick-cli.c:653
#6 0x55deec32b99b in MagickImageCommand MagickWand/magick-cli.c:1392
#7 0x55deec324d58 in MagickCommandGenesis MagickWand/magick-cli.c:177
#8 0x55deead82519 in MagickMain utilities/magick.c:162
#9 0x55deead828be in main utilities/magick.c:193
#10 0x7fb90807fd8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
#11 0x7fb90807fe3f in __libc_start_main_impl ../csu/libc-start.c:392
#12 0x55deead81974 in _start (/data/ylwang/LargeScan/targets/ImageMagick/utilities/magick+0x22fb974)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: UNKNOWN SIGNAL coders/yuv.c:210 in ReadYUVImage
==3543373==ABORTING
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25799 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05342 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05337 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05294 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05259 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05106 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05102 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05159 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05172 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05189 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05219 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05202 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05147 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05168 |
| published_at |
2026-04-07T12:55:00Z |
|
| 13 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05796 |
| published_at |
2026-05-14T12:55:00Z |
|
| 14 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05635 |
| published_at |
2026-05-05T12:55:00Z |
|
| 15 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05687 |
| published_at |
2026-05-07T12:55:00Z |
|
| 16 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05775 |
| published_at |
2026-05-09T12:55:00Z |
|
| 17 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05787 |
| published_at |
2026-05-11T12:55:00Z |
|
| 18 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05791 |
| published_at |
2026-05-12T12:55:00Z |
|
| 19 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.19061 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25799 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25799, GHSA-543g-8grm-9cw6
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kefv-kpkk-wudf |
|
| 39 |
| url |
VCID-mntx-6yku-3qcx |
| vulnerability_id |
VCID-mntx-6yku-3qcx |
| summary |
ImageMagick: SVG-to-MVG Command Injection via coders/svg.c
An attacker can inject arbitrary MVG (Magick Vector Graphics) drawing commands in an SVG file that is read by the internal SVG decoder of ImageMagick. The injected MVG commands execute during rendering. |
| references |
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
GHSA-xpg8-7m6m-jf56
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mntx-6yku-3qcx |
|
| 40 |
| url |
VCID-n47w-r932-abey |
| vulnerability_id |
VCID-n47w-r932-abey |
| summary |
ImageMagick is vulnerable to Heap Overflow when writing extremely large image profile in the PNG encoder
An extremely large image profile could result in a heap overflow when encoding a PNG image. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-30883 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00668 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00642 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00637 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00638 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00631 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00636 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00676 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00677 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00679 |
| published_at |
2026-05-07T12:55:00Z |
|
| 9 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00686 |
| published_at |
2026-05-05T12:55:00Z |
|
| 10 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00674 |
| published_at |
2026-05-09T12:55:00Z |
|
| 11 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00669 |
| published_at |
2026-05-11T12:55:00Z |
|
| 12 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00662 |
| published_at |
2026-05-12T12:55:00Z |
|
| 13 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00447 |
| published_at |
2026-04-02T12:55:00Z |
|
| 14 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00446 |
| published_at |
2026-04-04T12:55:00Z |
|
| 15 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00439 |
| published_at |
2026-04-07T12:55:00Z |
|
| 16 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00435 |
| published_at |
2026-04-08T12:55:00Z |
|
| 17 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00437 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-30883 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-30883, GHSA-qmw5-2p58-xvrc
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n47w-r932-abey |
|
| 41 |
| url |
VCID-ny3q-taj8-9qdx |
| vulnerability_id |
VCID-ny3q-taj8-9qdx |
| summary |
ImageMagick has possible memory leak in ASHLAR coder when action fails
The ASHLAR coder leaks a temporary image when an action fails and that could result to an out of memory. |
| references |
|
| fixed_packages |
|
| aliases |
GHSA-6p22-q7w5-33pg
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ny3q-taj8-9qdx |
|
| 42 |
| url |
VCID-p5aw-n691-nkff |
| vulnerability_id |
VCID-p5aw-n691-nkff |
| summary |
ImageMagick: MSL image stack index may fail to refresh, leading to leaked images
Sometimes msl.c fails to update the stack index, so an image is stored in the wrong slot and never freed on error, causing leaks.
```
==841485==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 13512 byte(s) in 1 object(s) allocated from:
#0 0x7ff330759887 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:145
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25988 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06725 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06733 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06724 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06726 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06568 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06577 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06647 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06656 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06663 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06671 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06628 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06578 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06558 |
| published_at |
2026-04-02T12:55:00Z |
|
| 13 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06594 |
| published_at |
2026-04-04T12:55:00Z |
|
| 14 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0734 |
| published_at |
2026-05-14T12:55:00Z |
|
| 15 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0707 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07225 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07308 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07289 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07305 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25988 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25988, GHSA-782x-jh29-9mf7
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p5aw-n691-nkff |
|
| 43 |
| url |
VCID-pcme-bwan-3bcf |
| vulnerability_id |
VCID-pcme-bwan-3bcf |
| summary |
ImageMagick has NULL Pointer Dereference in ClonePixelCacheRepository via crafted image
A NULL pointer dereference in ClonePixelCacheRepository allows a remote attacker to crash any application linked against ImageMagick by supplying a crafted image file, resulting in Denial of Service.
```
AddressSanitizer:DEADLYSIGNAL
=================================================================
==3704942==ERROR: AddressSanitizer: UNKNOWN SIGNAL on unknown address 0x000000000000 (pc 0x7f9d141239e0 bp 0x7ffd4c5711e0 sp 0x7ffd4c571148 T0)
#0 0x7f9d141239e0 (/lib/x86_64-linux-gnu/libc.so.6+0xc49e0)
#1 0x558a25e4f08d in ClonePixelCacheRepository._omp_fn.0 MagickCore/cache.c:784
#2 0x7f9d14c06a15 in GOMP_parallel (/lib/x86_64-linux-gnu/libgomp.so.1+0x14a15)
#3 0x558a25e43151 in ClonePixelCacheRepository MagickCore/cache.c:753
#4 0x558a25e49a96 in OpenPixelCache MagickCore/cache.c:3849
#5 0x558a25e45117 in GetImagePixelCache MagickCore/cache.c:1829
#6 0x558a25e4dde3 in SyncImagePixelCache MagickCore/cache.c:5647
#7 0x558a256ba57d in SetImageExtent MagickCore/image.c:2713
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25798 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19264 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19304 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19314 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19416 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19401 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19393 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19433 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19491 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19538 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19535 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19483 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19683 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19405 |
| published_at |
2026-04-07T12:55:00Z |
|
| 13 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20223 |
| published_at |
2026-05-14T12:55:00Z |
|
| 14 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.19976 |
| published_at |
2026-05-05T12:55:00Z |
|
| 15 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20052 |
| published_at |
2026-05-07T12:55:00Z |
|
| 16 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20138 |
| published_at |
2026-05-09T12:55:00Z |
|
| 17 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20109 |
| published_at |
2026-05-11T12:55:00Z |
|
| 18 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20133 |
| published_at |
2026-05-12T12:55:00Z |
|
| 19 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35968 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25798 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25798, GHSA-p863-5fgm-rgq4
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pcme-bwan-3bcf |
|
| 44 |
| url |
VCID-r3vw-ncns-cqgb |
| vulnerability_id |
VCID-r3vw-ncns-cqgb |
| summary |
ImageMagick is vulnerable to heap buffer over-write on 32-bit systems in SFW decoder
An overflow on 32-bit systems can cause a crash in the SFW decoder when processing extremely large images. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-31853 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02624 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02649 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02629 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02625 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02621 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02606 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03428 |
| published_at |
2026-05-14T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03252 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0323 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03215 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03335 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03326 |
| published_at |
2026-04-26T12:55:00Z |
|
| 13 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03371 |
| published_at |
2026-04-29T12:55:00Z |
|
| 14 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03321 |
| published_at |
2026-05-05T12:55:00Z |
|
| 15 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03343 |
| published_at |
2026-05-07T12:55:00Z |
|
| 16 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03381 |
| published_at |
2026-05-09T12:55:00Z |
|
| 17 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03385 |
| published_at |
2026-05-11T12:55:00Z |
|
| 18 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03393 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-31853 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-31853, GHSA-56jp-jfqg-f8f4
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r3vw-ncns-cqgb |
|
| 45 |
| url |
VCID-rbdg-vz8x-ykah |
| vulnerability_id |
VCID-rbdg-vz8x-ykah |
| summary |
ImageMagick has heap use-after-free in the MSL encoder
A heap-use-after-free vulnerability exists in the MSL encoder, where a cloned image is destroyed twice. The MSL coder does not support writing MSL so the write capability has been removed.
```
SUMMARY: AddressSanitizer: heap-use-after-free MagickCore/image.c:1195 in DestroyImage
Shadow bytes around the buggy address:
0x0a4e80007450: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0a4e80007460: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0a4e80007470: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0a4e80007480: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0a4e80007490: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
=>0x0a4e800074a0: fd fd fd fd fd fd fd fd fd fd[fd]fd fd fd fd fd
0x0a4e800074b0: fd fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa
0x0a4e800074c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0a4e800074d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0a4e800074e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0a4e800074f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-28688 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12789 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12738 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12659 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12854 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12806 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14091 |
| published_at |
2026-05-14T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14015 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13978 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13928 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13832 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13825 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13897 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13902 |
| published_at |
2026-04-26T12:55:00Z |
|
| 13 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13834 |
| published_at |
2026-04-29T12:55:00Z |
|
| 14 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13716 |
| published_at |
2026-05-05T12:55:00Z |
|
| 15 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13872 |
| published_at |
2026-05-07T12:55:00Z |
|
| 16 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1396 |
| published_at |
2026-05-09T12:55:00Z |
|
| 17 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13952 |
| published_at |
2026-05-11T12:55:00Z |
|
| 18 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13995 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-28688 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-28688, GHSA-xxw5-m53x-j38c
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rbdg-vz8x-ykah |
|
| 46 |
| url |
VCID-rj9n-ra1t-77dy |
| vulnerability_id |
VCID-rj9n-ra1t-77dy |
| summary |
ImageMagick has stack buffer overflow in MagnifyImage
MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow this buffer and corrupt the stack. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-30929 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02811 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02791 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02787 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02779 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02764 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04123 |
| published_at |
2026-05-14T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03899 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03878 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03889 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04009 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04019 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04026 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04071 |
| published_at |
2026-04-29T12:55:00Z |
|
| 13 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04031 |
| published_at |
2026-05-05T12:55:00Z |
|
| 14 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04045 |
| published_at |
2026-05-07T12:55:00Z |
|
| 15 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04078 |
| published_at |
2026-05-09T12:55:00Z |
|
| 16 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04084 |
| published_at |
2026-05-11T12:55:00Z |
|
| 17 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04092 |
| published_at |
2026-05-12T12:55:00Z |
|
| 18 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03945 |
| published_at |
2026-04-11T12:55:00Z |
|
| 19 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03928 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-30929 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-30929, GHSA-rqq8-jh93-f4vg
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rj9n-ra1t-77dy |
|
| 47 |
| url |
VCID-rjkf-pdny-2fhn |
| vulnerability_id |
VCID-rjkf-pdny-2fhn |
| summary |
ImageMagick vulnerable to stack corruption through long morphology kernel names or arrays
A stack buffer overflow exists in ImageMagick's morphology kernel parsing functions. User-controlled kernel strings exceeding a buffer are copied into fixed-size stack buffers via memcpy without bounds checking, resulting in stack corruption. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-28494 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02649 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02629 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02625 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02621 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02606 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03428 |
| published_at |
2026-05-14T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03252 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0323 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03215 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03335 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03326 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03371 |
| published_at |
2026-04-29T12:55:00Z |
|
| 13 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03321 |
| published_at |
2026-05-05T12:55:00Z |
|
| 14 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03343 |
| published_at |
2026-05-07T12:55:00Z |
|
| 15 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03381 |
| published_at |
2026-05-09T12:55:00Z |
|
| 16 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03385 |
| published_at |
2026-05-11T12:55:00Z |
|
| 17 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03393 |
| published_at |
2026-05-12T12:55:00Z |
|
| 18 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03279 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-28494 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-28494, GHSA-932h-jw47-73jm
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rjkf-pdny-2fhn |
|
| 48 |
| url |
VCID-ruf5-255v-sfdb |
| vulnerability_id |
VCID-ruf5-255v-sfdb |
| summary |
ImageMagick: Out of bounds read in multiple coders read raw pixel data
A heap buffer over-read vulnerability exists in multiple raw image format handles. The vulnerability occurs when processing images with -extract dimensions larger than -size dimensions, causing out-of-bounds memory reads from a heap-allocated buffer. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25576 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0283 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00425 |
| published_at |
2026-05-12T12:55:00Z |
|
| 2 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00427 |
| published_at |
2026-05-11T12:55:00Z |
|
| 3 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00433 |
| published_at |
2026-05-09T12:55:00Z |
|
| 4 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00437 |
| published_at |
2026-05-07T12:55:00Z |
|
| 5 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00434 |
| published_at |
2026-05-05T12:55:00Z |
|
| 6 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00301 |
| published_at |
2026-04-29T12:55:00Z |
|
| 7 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00288 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0043 |
| published_at |
2026-05-14T12:55:00Z |
|
| 9 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00293 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00291 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0029 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00287 |
| published_at |
2026-04-13T12:55:00Z |
|
| 13 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00306 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00308 |
| published_at |
2026-04-24T12:55:00Z |
|
| 15 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00307 |
| published_at |
2026-04-21T12:55:00Z |
|
| 16 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00285 |
| published_at |
2026-04-16T12:55:00Z |
|
| 17 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00302 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25576 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25576, GHSA-jv4p-gjwq-9r2j
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ruf5-255v-sfdb |
|
| 49 |
| url |
VCID-sd54-b8z1-2fg7 |
| vulnerability_id |
VCID-sd54-b8z1-2fg7 |
| summary |
ImageMagick: Integer overflow or wraparound and incorrect conversion between numeric types in the internal SVG decoder
A crafted SVG file can cause a denial of service. An off-by-one boundary check (`>` instead of `>=`) that allows bypass the guard and reach an undefined `(size_t)` cast. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25989 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0531 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05305 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05261 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05228 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05076 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05071 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05124 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05137 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05154 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05183 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05167 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05133 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05112 |
| published_at |
2026-04-04T12:55:00Z |
|
| 13 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05082 |
| published_at |
2026-04-02T12:55:00Z |
|
| 14 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0577 |
| published_at |
2026-05-14T12:55:00Z |
|
| 15 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05605 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05659 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05748 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0576 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05763 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25989 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25989, GHSA-7355-pwx2-pm84
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sd54-b8z1-2fg7 |
|
| 50 |
| url |
VCID-sd7w-6qv5-73ge |
| vulnerability_id |
VCID-sd7w-6qv5-73ge |
| summary |
ImageMagick: Integer Overflow in PSB (PSD v2) RLE decoding path causes heap Out of Bounds reads for 32-bit builds
An integer overflow in the PSB (PSD v2) RLE decoding path causes a heap out-of-bounds read on 32-bit builds. This can lead to information disclosure or a crash when processing crafted PSB files.
```
=================================================================
==3298==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xf512eb00 at pc 0xf76760b5 bp 0xffc1dfb8 sp 0xffc1dfa8
READ of size 8 at 0xf512eb00 thread T0
#0 0xf76760b4 in ReadPSDChannelRLE coders/psd.c:1141
``` |
| references |
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25984, GHSA-273h-m46v-96q4
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sd7w-6qv5-73ge |
|
| 51 |
| url |
VCID-sdc2-fcap-abaz |
| vulnerability_id |
VCID-sdc2-fcap-abaz |
| summary |
ImageMagick has Heap Out-of-Bounds Read in DCM Decoder (ReadDCMImage)
A heap out-of-bounds read vulnerability exists in the `coders/dcm.c` module. When processing DICOM files with a specific configuration, the decoder loop incorrectly reads bytes per iteration. This causes the function to read past the end of the allocated buffer, potentially leading to a Denial of Service (crash) or Information Disclosure (leaking heap memory into the image). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25982 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04278 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04242 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04223 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04211 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04092 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04084 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04142 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04156 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04176 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04162 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04116 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0413 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04734 |
| published_at |
2026-05-14T12:55:00Z |
|
| 13 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04651 |
| published_at |
2026-05-05T12:55:00Z |
|
| 14 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04687 |
| published_at |
2026-05-07T12:55:00Z |
|
| 15 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04731 |
| published_at |
2026-05-09T12:55:00Z |
|
| 16 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04737 |
| published_at |
2026-05-12T12:55:00Z |
|
| 17 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16707 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25982 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25982, GHSA-pmq6-8289-hx3v
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sdc2-fcap-abaz |
|
| 52 |
| url |
VCID-spch-fffg-4yc5 |
| vulnerability_id |
VCID-spch-fffg-4yc5 |
| summary |
Withdrawn Advisory: ImageMagick has a use-after-free/double-free risk in Options::fontFamily when clearing family
## Withdrawn Advisory
This advisory has been withdrawn because it does not affect the ImageMagick project's NuGet packages.
### Original Description
We believe that we have discovered a potential security vulnerability in ImageMagick’s Magick++ layer that manifests when `Options::fontFamily` is invoked with an empty string.
**Vulnerability Details**
- Clearing a font family calls `RelinquishMagickMemory` on `_drawInfo->font`, freeing the font string but leaving `_drawInfo->font` pointing to freed memory while `_drawInfo->family` is set to that (now-invalid) pointer. Any later cleanup or reuse of `_drawInfo->font` re-frees or dereferences dangling memory.
- `DestroyDrawInfo` and other setters (`Options::font`, `Image::font`) assume `_drawInfo->font` remains valid, so destruction or subsequent updates trigger crashes or heap corruption.
```cpp
if (family_.length() == 0)
{
_drawInfo->family=(char *) RelinquishMagickMemory(_drawInfo->font);
DestroyString(RemoveImageOption(imageInfo(),"family"));
}
```
- **CWE-416 (Use After Free):** `_drawInfo->font` is left dangling yet still reachable through the Options object.
- **CWE-415 (Double Free):** DrawInfo teardown frees `_drawInfo->font` again, provoking allocator aborts.
**Affected Versions**
- Introduced by commit `6409f34d637a34a1c643632aa849371ec8b3b5a8` (“Added fontFamily to the Image class of Magick++”, 2015-08-01, blame line 313).
- Present in all releases that include that commit, at least ImageMagick 7.0.1-0 and later (likely late 6.9 builds with Magick++ font family support as well). Older releases without `fontFamily` are unaffected.
**Command Line Triggerability**
This vulnerability cannot be triggered from the command line interface. The bug is specific to the Magick++ C++ API, specifically the `Options::fontFamily()` method. The command-line utilities (such as `convert`, `magick`, etc.) do not expose this particular code path, as they operate through different internal mechanisms that do not directly call `Options::fontFamily()` with an empty string in a way that would trigger the use-after-free condition.
**Proposed Fix**
```diff
diff --git a/Magick++/lib/Options.cpp b/Magick++/lib/Options.cpp
@@ void Magick::Options::fontFamily(const std::string &family_)
- _drawInfo->family=(char *) RelinquishMagickMemory(_drawInfo->font);
+ _drawInfo->family=(char *) RelinquishMagickMemory(_drawInfo->family);
```
This frees only the actual family string, leaving `_drawInfo->font` untouched. Optionally nulling `_drawInfo->font` when clearing `font()` itself maintains allocator hygiene. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-65955 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03236 |
| published_at |
2026-05-11T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03232 |
| published_at |
2026-05-09T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03195 |
| published_at |
2026-05-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03171 |
| published_at |
2026-05-05T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04748 |
| published_at |
2026-05-14T12:55:00Z |
|
| 5 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05753 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07844 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.0789 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07901 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07925 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07912 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07896 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07883 |
| published_at |
2026-04-13T12:55:00Z |
|
| 13 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07797 |
| published_at |
2026-04-16T12:55:00Z |
|
| 14 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07781 |
| published_at |
2026-04-18T12:55:00Z |
|
| 15 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07936 |
| published_at |
2026-04-21T12:55:00Z |
|
| 16 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07863 |
| published_at |
2026-04-26T12:55:00Z |
|
| 17 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07832 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-65955 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-65955, GHSA-q3hc-j9x5-mp9m
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-spch-fffg-4yc5 |
|
| 53 |
| url |
VCID-sw7g-hxxr-n3e1 |
| vulnerability_id |
VCID-sw7g-hxxr-n3e1 |
| summary |
ImageMagick has a Path Policy TOCTOU symlink race bypass
`domain="path"` authorization is checked before final file open/use. A symlink swap between check-time and use-time bypasses policy-denied read/write. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-28689 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00728 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00721 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00718 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00723 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00722 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00712 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0074 |
| published_at |
2026-05-07T12:55:00Z |
|
| 7 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00734 |
| published_at |
2026-05-09T12:55:00Z |
|
| 8 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0073 |
| published_at |
2026-05-11T12:55:00Z |
|
| 9 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00725 |
| published_at |
2026-05-12T12:55:00Z |
|
| 10 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0089 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00945 |
| published_at |
2026-04-29T12:55:00Z |
|
| 12 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00889 |
| published_at |
2026-04-16T12:55:00Z |
|
| 13 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00949 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00953 |
| published_at |
2026-04-26T12:55:00Z |
|
| 15 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00947 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00892 |
| published_at |
2026-04-13T12:55:00Z |
|
| 17 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00896 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-28689 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-28689, GHSA-493f-jh8w-qhx3
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sw7g-hxxr-n3e1 |
|
| 54 |
| url |
VCID-tv15-dcnu-pbbn |
| vulnerability_id |
VCID-tv15-dcnu-pbbn |
| summary |
ImageMagick: Heap overflow in pcd decoder leads to out of bounds read.
The pcd coder lacks proper boundary checking when processing Huffman-coded data. The decoder contains an function that has an incorrect initialization that could cause an out of bounds read.
```
==3900053==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x502000003c6c at pc 0x55601b9cc552 bp 0x7ffd904b1f70 sp 0x7ffd904b1f60
READ of size 1 at 0x502000003c6c thread T0
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-26284 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06084 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.0608 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06044 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06013 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.0586 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05849 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05884 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05892 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05901 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05923 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05823 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05891 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05853 |
| published_at |
2026-04-07T12:55:00Z |
|
| 13 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05858 |
| published_at |
2026-04-04T12:55:00Z |
|
| 14 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06572 |
| published_at |
2026-05-14T12:55:00Z |
|
| 15 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06342 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06456 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06531 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06544 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06555 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-26284 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-26284, GHSA-wrhr-rf8j-r842
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tv15-dcnu-pbbn |
|
| 55 |
| url |
VCID-utfe-h3b7-jqcj |
| vulnerability_id |
VCID-utfe-h3b7-jqcj |
| summary |
ImageMagick: MSL - Stack overflow in ProcessMSLScript
### Summary
Magick fails to check for circular references between two MSLs, leading to a stack overflow.
### Details
After reading a.msl using magick, the following is displayed:
`MSLStartElement` -> `ReadImage` -> `ReadMSLImage` -> `ProcessMSLScript` -> `xmlParseChunk` -> `xmlParseTryOrFinish` -> `MSLStartElement`
```bash
AddressSanitizer:DEADLYSIGNAL
=================================================================
==114345==ERROR: AddressSanitizer: UNKNOWN SIGNAL on unknown address 0x000000000000 (pc 0x72509fc7d804 bp 0x7ffd6598b390 sp 0x7ffd6598ab20 T0)
#0 0x72509fc7d804 in strlen ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:388
[...]
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25971 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.12904 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13009 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13041 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.1302 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.12922 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.12919 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13017 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13068 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13107 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13138 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13153 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13209 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13088 |
| published_at |
2026-04-08T12:55:00Z |
|
| 13 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13007 |
| published_at |
2026-04-07T12:55:00Z |
|
| 14 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13797 |
| published_at |
2026-05-14T12:55:00Z |
|
| 15 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13432 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13588 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13672 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13666 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.137 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25971 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25971, GHSA-8mpr-6xr2-chhc
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-utfe-h3b7-jqcj |
|
| 56 |
| url |
VCID-uvpj-a8v5-ebgz |
| vulnerability_id |
VCID-uvpj-a8v5-ebgz |
| summary |
Image Magick has a Memory Leak in coders/ashlar.c
Memory leak exists in `coders/ashlar.c`. The `WriteASHLARImage` allocates a structure. However, when an exception is thrown, the allocated memory is not properly released, resulting in a potential memory leak.
```
```bash
==78968== Memcheck, a memory error detector
==78968== Copyright (C) 2002-2022, and GNU GPL'd, by Julian Seward et al.
==78968== Using Valgrind-3.22.0 and LibVEX; rerun with -h for copyright info
==78968==
==78968== HEAP SUMMARY:
==78968== in use at exit: 17,232 bytes in 4 blocks
==78968== total heap usage: 4,781 allocs, 4,777 frees, 785,472 bytes allocated
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25969 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04879 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04961 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04955 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04916 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05291 |
| published_at |
2026-05-07T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05242 |
| published_at |
2026-05-05T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05346 |
| published_at |
2026-05-14T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05342 |
| published_at |
2026-05-12T12:55:00Z |
|
| 8 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05344 |
| published_at |
2026-05-11T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05335 |
| published_at |
2026-05-09T12:55:00Z |
|
| 10 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17899 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.18055 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.1811 |
| published_at |
2026-04-04T12:55:00Z |
|
| 13 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17811 |
| published_at |
2026-04-07T12:55:00Z |
|
| 14 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.1796 |
| published_at |
2026-04-09T12:55:00Z |
|
| 15 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17976 |
| published_at |
2026-04-11T12:55:00Z |
|
| 16 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17931 |
| published_at |
2026-04-12T12:55:00Z |
|
| 17 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17882 |
| published_at |
2026-04-13T12:55:00Z |
|
| 18 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17825 |
| published_at |
2026-04-16T12:55:00Z |
|
| 19 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17835 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25969 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25969, GHSA-xgm3-v4r9-wfgm
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uvpj-a8v5-ebgz |
|
| 57 |
| url |
VCID-vaks-d4k5-zue7 |
| vulnerability_id |
VCID-vaks-d4k5-zue7 |
| summary |
ImageMagick MSL: Stack overflow via infinite recursion in ProcessMSLScript
## Summary
Stack overflow via infinite recursion in MSL (Magick Scripting Language) `<write>` command when writing to MSL format.
## Version
- ImageMagick 7.x (tested on current main branch)
- Commit: HEAD
- Requires: libxml2 support (for MSL parsing)
## Steps to Reproduce
### Method 1: Using ImageMagick directly
```bash
magick MSL:recursive.msl out.png
```
### Method 2: Using OSS-Fuzz reproduce
```bash
python3 infra/helper.py build_fuzzers imagemagick
python3 infra/helper.py reproduce imagemagick msl_fuzzer recursive.msl
```
Or run the fuzzer directly:
```bash
./msl_fuzzer recursive.msl
```
## Expected Behavior
ImageMagick should handle recursive MSL references gracefully by detecting the loop and returning an error.
## Actual Behavior
Stack overflow causes process crash:
```
AddressSanitizer:DEADLYSIGNAL
==PID==ERROR: AddressSanitizer: stack-overflow
#0 MSLStartElement /src/imagemagick/coders/msl.c:7045
#1 xmlParseStartTag /src/libxml2/parser.c
#2 xmlParseChunk /src/libxml2/parser.c:11273
#3 ProcessMSLScript /src/imagemagick/coders/msl.c:7405
#4 WriteMSLImage /src/imagemagick/coders/msl.c:7867
#5 WriteImage /src/imagemagick/MagickCore/constitute.c:1346
#6 MSLStartElement /src/imagemagick/coders/msl.c:7045
... (infinite recursion, 287+ frames)
```
## Root Cause Analysis
In `coders/msl.c`, the `<write>` command handler in `MSLStartElement()` (line ~7045) calls `WriteImage()`. When the output filename specifies MSL format (`msl:filename`), `WriteMSLImage()` is called, which parses the MSL file again via `ProcessMSLScript()`.
If the MSL file references itself (directly or indirectly), this creates an infinite recursion loop:
```
MSLStartElement() → WriteImage() → WriteMSLImage() → ProcessMSLScript()
→ xmlParseChunk() → MSLStartElement() → ... (infinite loop)
```
## Impact
- **DoS**: Guaranteed crash via stack exhaustion
- **Affected**: Any application using ImageMagick to process user-supplied MSL files
## Additional Trigger Paths
The `<read>` command can also trigger recursion:
Indirect recursion is also possible (a.msl → b.msl → a.msl).
## Fuzzer
This issue was discovered using a custom MSL fuzzer:
```cpp
#include <cstdint>
#include <Magick++/Blob.h>
#include <Magick++/Image.h>
#include "utils.cc"
extern "C" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size)
{
if (IsInvalidSize(Size))
return(0);
try
{
const Magick::Blob blob(Data, Size);
Magick::Image image;
image.magick("MSL");
image.fileName("MSL:");
image.read(blob);
}
catch (Magick::Exception)
{
}
return(0);
}
```
This issue was found by Team FuzzingBrain @ Texas A&M University |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-23874 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05363 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05093 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05041 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05046 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05194 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05225 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05267 |
| published_at |
2026-04-26T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05271 |
| published_at |
2026-04-29T12:55:00Z |
|
| 8 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0526 |
| published_at |
2026-05-05T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05309 |
| published_at |
2026-05-07T12:55:00Z |
|
| 10 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05353 |
| published_at |
2026-05-09T12:55:00Z |
|
| 11 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05361 |
| published_at |
2026-05-11T12:55:00Z |
|
| 12 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05359 |
| published_at |
2026-05-12T12:55:00Z |
|
| 13 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05051 |
| published_at |
2026-04-02T12:55:00Z |
|
| 14 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0508 |
| published_at |
2026-04-04T12:55:00Z |
|
| 15 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05101 |
| published_at |
2026-04-07T12:55:00Z |
|
| 16 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05134 |
| published_at |
2026-04-08T12:55:00Z |
|
| 17 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0515 |
| published_at |
2026-04-09T12:55:00Z |
|
| 18 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05125 |
| published_at |
2026-04-11T12:55:00Z |
|
| 19 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05108 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-23874 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.2 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-15ny-qqbj-qyfk |
|
| 1 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 2 |
| vulnerability |
VCID-29r3-kvf4-n3hc |
|
| 3 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 4 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 5 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 6 |
| vulnerability |
VCID-5uyd-bv33-h7g1 |
|
| 7 |
| vulnerability |
VCID-5xqd-gf3b-4ygw |
|
| 8 |
| vulnerability |
VCID-5zkt-kcgx-a3e2 |
|
| 9 |
| vulnerability |
VCID-62ar-kwbq-nyh3 |
|
| 10 |
| vulnerability |
VCID-69f6-ceje-hyah |
|
| 11 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 12 |
| vulnerability |
VCID-6rma-wjdv-uqe9 |
|
| 13 |
| vulnerability |
VCID-6ztv-auh8-27gx |
|
| 14 |
| vulnerability |
VCID-acsa-1uwk-fqee |
|
| 15 |
| vulnerability |
VCID-anyp-2jr7-73a1 |
|
| 16 |
| vulnerability |
VCID-b5pd-kk97-gban |
|
| 17 |
| vulnerability |
VCID-bd1g-sfsp-37h7 |
|
| 18 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 19 |
| vulnerability |
VCID-cbqr-aybx-d3e6 |
|
| 20 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 21 |
| vulnerability |
VCID-d8yf-8rff-3yhf |
|
| 22 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 23 |
| vulnerability |
VCID-dtza-65ku-aber |
|
| 24 |
| vulnerability |
VCID-emmr-15qp-vfah |
|
| 25 |
| vulnerability |
VCID-f1zu-xb4j-8qhp |
|
| 26 |
| vulnerability |
VCID-fnck-7mvx-hqc9 |
|
| 27 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 28 |
| vulnerability |
VCID-gdg8-aejn-83c4 |
|
| 29 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 30 |
| vulnerability |
VCID-jcjk-s89c-mbbm |
|
| 31 |
| vulnerability |
VCID-jvq6-xjbu-fkb9 |
|
| 32 |
| vulnerability |
VCID-kdw5-8y5z-zya5 |
|
| 33 |
| vulnerability |
VCID-kefv-kpkk-wudf |
|
| 34 |
| vulnerability |
VCID-mntx-6yku-3qcx |
|
| 35 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 36 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 37 |
| vulnerability |
VCID-p5aw-n691-nkff |
|
| 38 |
| vulnerability |
VCID-pcme-bwan-3bcf |
|
| 39 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 40 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 41 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 42 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 43 |
| vulnerability |
VCID-ruf5-255v-sfdb |
|
| 44 |
| vulnerability |
VCID-sd54-b8z1-2fg7 |
|
| 45 |
| vulnerability |
VCID-sd7w-6qv5-73ge |
|
| 46 |
| vulnerability |
VCID-sdc2-fcap-abaz |
|
| 47 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 48 |
| vulnerability |
VCID-tv15-dcnu-pbbn |
|
| 49 |
| vulnerability |
VCID-utfe-h3b7-jqcj |
|
| 50 |
| vulnerability |
VCID-uvpj-a8v5-ebgz |
|
| 51 |
| vulnerability |
VCID-vpdn-g1k9-1kdn |
|
| 52 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 53 |
| vulnerability |
VCID-x44m-x33k-hydn |
|
| 54 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 55 |
| vulnerability |
VCID-xbsu-ac6g-53fn |
|
| 56 |
| vulnerability |
VCID-y4hn-6bv6-jugw |
|
| 57 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 58 |
| vulnerability |
VCID-yx7r-r7ez-7uhp |
|
| 59 |
| vulnerability |
VCID-z9t9-bxf9-hkfk |
|
| 60 |
| vulnerability |
VCID-zab9-9tqj-hbhg |
|
| 61 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 62 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
| 63 |
| vulnerability |
VCID-zx14-t8et-ufcq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.2 |
|
|
| aliases |
CVE-2026-23874, GHSA-9vj4-wc7r-p844
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vaks-d4k5-zue7 |
|
| 58 |
| url |
VCID-vpdn-g1k9-1kdn |
| vulnerability_id |
VCID-vpdn-g1k9-1kdn |
| summary |
ImageMagick has heap buffer overflow in YUV 4:2:2 decoder
A heap buffer overflow write vulnerability exists in ReadYUVImage() (coders/yuv.c) when processing malicious YUV 4:2:2 (NoInterlace) images. The pixel-pair loop writes one pixel beyond the allocated row buffer.
```
=================================================================
==204642==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x5170000002e0 at pc 0x562d21a7e8de bp 0x7fffa9ae1270 sp 0x7fffa9ae1260
WRITE of size 8 at 0x5170000002e0 thread T0
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25986 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0723 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07257 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0725 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07292 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07168 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07174 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07243 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07252 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07266 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07269 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07242 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07208 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07188 |
| published_at |
2026-04-07T12:55:00Z |
|
| 13 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07845 |
| published_at |
2026-05-14T12:55:00Z |
|
| 14 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07563 |
| published_at |
2026-05-05T12:55:00Z |
|
| 15 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07707 |
| published_at |
2026-05-07T12:55:00Z |
|
| 16 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07778 |
| published_at |
2026-05-09T12:55:00Z |
|
| 17 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07771 |
| published_at |
2026-05-11T12:55:00Z |
|
| 18 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07795 |
| published_at |
2026-05-12T12:55:00Z |
|
| 19 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19294 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25986 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25986, GHSA-mqfc-82jx-3mr2
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vpdn-g1k9-1kdn |
|
| 59 |
| url |
VCID-w9zg-tsbg-afa1 |
| vulnerability_id |
VCID-w9zg-tsbg-afa1 |
| summary |
ImageMagick: Magick.NET: ImageMagick: Denial of Service via out-of-bounds write in XML parsing |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33899 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04409 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04425 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0456 |
| published_at |
2026-05-14T12:55:00Z |
|
| 3 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04446 |
| published_at |
2026-04-26T12:55:00Z |
|
| 4 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04485 |
| published_at |
2026-04-29T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04553 |
| published_at |
2026-05-12T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04551 |
| published_at |
2026-05-11T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04515 |
| published_at |
2026-05-07T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04486 |
| published_at |
2026-05-05T12:55:00Z |
|
| 9 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11639 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12406 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33899 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-33899, GHSA-cr67-pvmx-2pp2
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w9zg-tsbg-afa1 |
|
| 60 |
| url |
VCID-x44m-x33k-hydn |
| vulnerability_id |
VCID-x44m-x33k-hydn |
| summary |
ImageMagick: Heap-based Buffer Overflow in GetPixelIndex due to metadata-cache desynchronization
`OpenPixelCache` updates image channel metadata **before** attempting pixel cache memory allocation. When both memory and disk allocation fail a heap-buffer-overflow read in occurs in any writer that calls `GetPixelIndex`. |
| references |
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
GHSA-gq5v-qf8q-fp77
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x44m-x33k-hydn |
|
| 61 |
| url |
VCID-x8c6-9pse-xkc8 |
| vulnerability_id |
VCID-x8c6-9pse-xkc8 |
| summary |
ImageMagick: Integer overflow in DIB coder can result in out of bounds read or write
An integer overflow in DIB coder can result in out of bounds read or write |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-28693 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18648 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18595 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18515 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18798 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18744 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20036 |
| published_at |
2026-05-14T12:55:00Z |
|
| 6 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20044 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20026 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.2003 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20029 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.19919 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.19914 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.19884 |
| published_at |
2026-04-29T12:55:00Z |
|
| 13 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.19789 |
| published_at |
2026-05-05T12:55:00Z |
|
| 14 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.19866 |
| published_at |
2026-05-07T12:55:00Z |
|
| 15 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.19954 |
| published_at |
2026-05-09T12:55:00Z |
|
| 16 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.19923 |
| published_at |
2026-05-11T12:55:00Z |
|
| 17 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.19948 |
| published_at |
2026-05-12T12:55:00Z |
|
| 18 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20148 |
| published_at |
2026-04-11T12:55:00Z |
|
| 19 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20102 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-28693 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-28693, GHSA-hffp-q43q-qq76
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x8c6-9pse-xkc8 |
|
| 62 |
| url |
VCID-xbsu-ac6g-53fn |
| vulnerability_id |
VCID-xbsu-ac6g-53fn |
| summary |
ImageMagick has heap-buffer-overflow via signed integer overflow in WriteUHDRImage when writing UHDR images with large dimensions
`WriteUHDRImage` in `coders/uhdr.c` uses `int` arithmetic to compute the pixel buffer size. When image dimensions are large, the multiplication overflows 32-bit `int`, causing an undersized heap allocation followed by an out-of-bounds write. This can crash the process or potentially lead to an out of bounds heap write.
```
==1575126==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7fc382ef3820 at pc 0x5560d31f229f bp 0x7ffe865f9530 sp 0x7ffe865f9520
WRITE of size 8 at 0x7fc382ef3820 thread T0
#0 0x5560d31f229e in WriteUHDRImage coders/uhdr.c:807
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25794 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05407 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05404 |
| published_at |
2026-05-12T12:55:00Z |
|
| 2 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05405 |
| published_at |
2026-05-11T12:55:00Z |
|
| 3 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05396 |
| published_at |
2026-05-09T12:55:00Z |
|
| 4 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04924 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05307 |
| published_at |
2026-05-05T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04999 |
| published_at |
2026-04-29T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05003 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04961 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05352 |
| published_at |
2026-05-07T12:55:00Z |
|
| 10 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.17952 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18197 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18251 |
| published_at |
2026-04-04T12:55:00Z |
|
| 13 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18038 |
| published_at |
2026-04-08T12:55:00Z |
|
| 14 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18098 |
| published_at |
2026-04-09T12:55:00Z |
|
| 15 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18107 |
| published_at |
2026-04-11T12:55:00Z |
|
| 16 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18063 |
| published_at |
2026-04-12T12:55:00Z |
|
| 17 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18013 |
| published_at |
2026-04-13T12:55:00Z |
|
| 18 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.17955 |
| published_at |
2026-04-16T12:55:00Z |
|
| 19 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.17966 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25794 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25794, GHSA-vhqj-f5cj-9x8h
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xbsu-ac6g-53fn |
|
| 63 |
| url |
VCID-y4hn-6bv6-jugw |
| vulnerability_id |
VCID-y4hn-6bv6-jugw |
| summary |
ImageMagick: MSL attribute stack buffer overflow leads to out of bounds write.
A stack buffer overflow occurs when processing the an attribute in msl.c. A long value overflows a fixed-size stack buffer, leading to memory corruption.
```
=================================================================
==278522==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffdb8c76984 at pc 0x55a4bf16f507 bp 0x7ffdb8c75bc0 sp 0x7ffdb8c75bb0
WRITE of size 1 at 0x7ffdb8c76984 thread T0
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25968 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18911 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18954 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18969 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19079 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.1907 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19059 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.191 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19155 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19201 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19194 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19294 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19346 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19141 |
| published_at |
2026-04-08T12:55:00Z |
|
| 13 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19061 |
| published_at |
2026-04-07T12:55:00Z |
|
| 14 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19859 |
| published_at |
2026-05-14T12:55:00Z |
|
| 15 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.1962 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19697 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19781 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19745 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19772 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25968 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25968, GHSA-3mwp-xqp2-q6ph
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y4hn-6bv6-jugw |
|
| 64 |
| url |
VCID-y58b-be93-hbfd |
| vulnerability_id |
VCID-y58b-be93-hbfd |
| summary |
ImageMagick: Write heap-buffer-overflow in PCL encoder via undersized output buffer
A heap-buffer-overflow vulnerability exists in the PCL encode due to an undersized output buffer allocation.
```
WRITE of size 1 at 0x7e79f91f31a0 thread T0
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-28686 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04189 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04175 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04143 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04127 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04109 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0511 |
| published_at |
2026-05-14T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04861 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04841 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0479 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04799 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04944 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0498 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05021 |
| published_at |
2026-04-26T12:55:00Z |
|
| 13 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05016 |
| published_at |
2026-04-29T12:55:00Z |
|
| 14 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05009 |
| published_at |
2026-05-05T12:55:00Z |
|
| 15 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05058 |
| published_at |
2026-05-07T12:55:00Z |
|
| 16 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05107 |
| published_at |
2026-05-09T12:55:00Z |
|
| 17 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05112 |
| published_at |
2026-05-12T12:55:00Z |
|
| 18 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04881 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-28686 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-28686, GHSA-467j-76j7-5885
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y58b-be93-hbfd |
|
| 65 |
| url |
VCID-yx7r-r7ez-7uhp |
| vulnerability_id |
VCID-yx7r-r7ez-7uhp |
| summary |
ImageMagick: Code Injection via PostScript header in ps coders
The ps encoders, responsible for writing PostScript files, fails to sanitize the input before writing it into the PostScript header. An attacker can provide a malicious file and inject arbitrary PostScript code. When the resulting file is processed by a printer or a viewer (like Ghostscript), the injected code is interpreted and executed.
The html encoder does not properly escape strings that are written to in the html document. An attacker can provide a malicious file and injection arbitrary html code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25797 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01069 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01059 |
| published_at |
2026-05-12T12:55:00Z |
|
| 2 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01065 |
| published_at |
2026-05-11T12:55:00Z |
|
| 3 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01073 |
| published_at |
2026-05-09T12:55:00Z |
|
| 4 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01077 |
| published_at |
2026-05-07T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.068 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00789 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0079 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00786 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0078 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00774 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00775 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00779 |
| published_at |
2026-04-18T12:55:00Z |
|
| 13 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00823 |
| published_at |
2026-04-21T12:55:00Z |
|
| 14 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00826 |
| published_at |
2026-04-24T12:55:00Z |
|
| 15 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00827 |
| published_at |
2026-04-26T12:55:00Z |
|
| 16 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00822 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25797 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25797, GHSA-rw6c-xp26-225v
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yx7r-r7ez-7uhp |
|
| 66 |
| url |
VCID-z9t9-bxf9-hkfk |
| vulnerability_id |
VCID-z9t9-bxf9-hkfk |
| summary |
ImageMagick has memory leak of watermark Image object in ReadSTEGANOImage on multiple error/early-return paths
### Summary
In `ReadSTEGANOImage()` (`coders/stegano.c`), the `watermark` Image object is not freed on three early-return paths, resulting in a definite memory leak (~13.5KB+ per invocation) that can be exploited for denial of service.
```
Direct leak of 13512 byte(s) in 1 object(s) allocated from:
#0 0x7f5c11e27887 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:145
#1 0x55cdc38f65c4 in AcquireMagickMemory MagickCore/memory.c:536
#2 0x55cdc38f65eb in AcquireCriticalMemory MagickCore/memory.c:612
#3 0x55cdc3899e91 in AcquireImage MagickCore/image.c:154
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25796 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07094 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07134 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07128 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07163 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07031 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07048 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07111 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0712 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07131 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07133 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07101 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07072 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07047 |
| published_at |
2026-04-07T12:55:00Z |
|
| 13 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0772 |
| published_at |
2026-05-14T12:55:00Z |
|
| 14 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07447 |
| published_at |
2026-05-05T12:55:00Z |
|
| 15 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07593 |
| published_at |
2026-05-07T12:55:00Z |
|
| 16 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07661 |
| published_at |
2026-05-09T12:55:00Z |
|
| 17 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07655 |
| published_at |
2026-05-11T12:55:00Z |
|
| 18 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07676 |
| published_at |
2026-05-12T12:55:00Z |
|
| 19 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18987 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25796 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25796, GHSA-g2pr-qxjg-7r2w
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z9t9-bxf9-hkfk |
|
| 67 |
| url |
VCID-zab9-9tqj-hbhg |
| vulnerability_id |
VCID-zab9-9tqj-hbhg |
| summary |
ImageMagick: Memory allocation with excessive without limits in the internal SVG decoder
A crafted SVG file containing an malicious element causes ImageMagick to attempt to allocate ~674 GB of memory, leading to an out-of-memory abort.
Found via AFL++ fuzzing with afl-clang-lto instrumentation and AddressSanitizer. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25985 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04961 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04955 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04916 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04879 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04734 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04725 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04773 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04792 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04827 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04815 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04782 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04745 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04767 |
| published_at |
2026-04-04T12:55:00Z |
|
| 13 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05346 |
| published_at |
2026-05-14T12:55:00Z |
|
| 14 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05242 |
| published_at |
2026-05-05T12:55:00Z |
|
| 15 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05291 |
| published_at |
2026-05-07T12:55:00Z |
|
| 16 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05335 |
| published_at |
2026-05-09T12:55:00Z |
|
| 17 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05344 |
| published_at |
2026-05-11T12:55:00Z |
|
| 18 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05342 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25985 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
CVE-2026-25985, GHSA-v7g2-m8c5-mf84
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zab9-9tqj-hbhg |
|
| 68 |
| url |
VCID-zpcy-nms7-kuha |
| vulnerability_id |
VCID-zpcy-nms7-kuha |
| summary |
ImageMagick has Integer Overflow leading to out of bounds write in SIXEL decoder
An integer overflow vulnerability exists in the SIXEL decoer. The vulnerability allows an attacker to perform an out of bounds via a specially crafted mage. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-28493 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17474 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17414 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17322 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17542 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17495 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18833 |
| published_at |
2026-05-14T12:55:00Z |
|
| 6 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18877 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.1883 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18843 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18858 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18746 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18725 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18682 |
| published_at |
2026-04-29T12:55:00Z |
|
| 13 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18556 |
| published_at |
2026-05-05T12:55:00Z |
|
| 14 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.1864 |
| published_at |
2026-05-07T12:55:00Z |
|
| 15 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18741 |
| published_at |
2026-05-09T12:55:00Z |
|
| 16 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18704 |
| published_at |
2026-05-11T12:55:00Z |
|
| 17 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18735 |
| published_at |
2026-05-12T12:55:00Z |
|
| 18 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18975 |
| published_at |
2026-04-11T12:55:00Z |
|
| 19 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18928 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-28493 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-28493, GHSA-r39q-jr8h-gcq2
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zpcy-nms7-kuha |
|
| 69 |
| url |
VCID-zvq4-ybph-buga |
| vulnerability_id |
VCID-zvq4-ybph-buga |
| summary |
ImageMagick has an Out-of-Bounds write of a zero byte in its X11 display interaction
An out-of-bounds write of a zero byte exists in the X11 `display` interaction path that could lead to a crash. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33535 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02773 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02762 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02764 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02792 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0277 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02735 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02724 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0274 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02744 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04197 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00252 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00253 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
5e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00251 |
| published_at |
2026-04-26T12:55:00Z |
|
| 13 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00321 |
| published_at |
2026-05-14T12:55:00Z |
|
| 14 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00327 |
| published_at |
2026-05-05T12:55:00Z |
|
| 15 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00329 |
| published_at |
2026-05-07T12:55:00Z |
|
| 16 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0033 |
| published_at |
2026-05-09T12:55:00Z |
|
| 17 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00325 |
| published_at |
2026-05-11T12:55:00Z |
|
| 18 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00318 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-33535 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-33535, GHSA-mw3m-pqr2-qv7c
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zvq4-ybph-buga |
|
| 70 |
| url |
VCID-zx14-t8et-ufcq |
| vulnerability_id |
VCID-zx14-t8et-ufcq |
| summary |
ImageMagick: Memory leak in coders/txt.c without freetype
If a `texture` attribute is specified for a TXT file, an attempt will be made to read it via `texture=ReadImage(read_info,exception);`. Later, when retrieving metrics via the `GetTypeMetrics` function, if this function fails (i.e., `status == MagickFalse`), the calling function will exit immediately but fail to release the texture object, leading to memory leakage. |
| references |
|
| fixed_packages |
| 0 |
| url |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| purl |
pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1cpn-zvem-v7gt |
|
| 1 |
| vulnerability |
VCID-2zje-ag2v-7kac |
|
| 2 |
| vulnerability |
VCID-4a2j-v88n-byfk |
|
| 3 |
| vulnerability |
VCID-54da-fzyt-4ud2 |
|
| 4 |
| vulnerability |
VCID-6h7x-3rue-kucp |
|
| 5 |
| vulnerability |
VCID-bw4q-dt1r-y3e4 |
|
| 6 |
| vulnerability |
VCID-cuhw-ew1g-s3h2 |
|
| 7 |
| vulnerability |
VCID-dabd-m3mf-3ker |
|
| 8 |
| vulnerability |
VCID-g41y-dv8u-3yf1 |
|
| 9 |
| vulnerability |
VCID-jc5m-7rvc-2qg6 |
|
| 10 |
| vulnerability |
VCID-n47w-r932-abey |
|
| 11 |
| vulnerability |
VCID-ny3q-taj8-9qdx |
|
| 12 |
| vulnerability |
VCID-r3vw-ncns-cqgb |
|
| 13 |
| vulnerability |
VCID-rbdg-vz8x-ykah |
|
| 14 |
| vulnerability |
VCID-rj9n-ra1t-77dy |
|
| 15 |
| vulnerability |
VCID-rjkf-pdny-2fhn |
|
| 16 |
| vulnerability |
VCID-sw7g-hxxr-n3e1 |
|
| 17 |
| vulnerability |
VCID-w9zg-tsbg-afa1 |
|
| 18 |
| vulnerability |
VCID-x8c6-9pse-xkc8 |
|
| 19 |
| vulnerability |
VCID-y58b-be93-hbfd |
|
| 20 |
| vulnerability |
VCID-zpcy-nms7-kuha |
|
| 21 |
| vulnerability |
VCID-zvq4-ybph-buga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:nuget/Magick.NET-Q8-OpenMP-arm64@14.10.3 |
|
|
| aliases |
GHSA-3q5f-gmjc-38r8
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zx14-t8et-ufcq |
|